WorldWideScience

Sample records for regional security agreements

  1. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  2. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  3. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  4. Why are Trade Agreements Regional?

    OpenAIRE

    Zissimos, Ben

    2007-01-01

    This paper shows how distance may be used to coordinate on a unique equilibrium in which trade agreements are regional. Trade agreement formation is modeled as coalition formation. In a standard trade model with no distance between countries, a familiar problem of coordination failure arises giving rise to multiple equilibria; any one of many possible trade agreements can form. With distance between countries, and through strategic interaction in tariff setting, regional trade agreements gene...

  5. African Regional Integration: Implications for Food Security

    NARCIS (Netherlands)

    Dijk, van M.

    2011-01-01

    This report looks at the African regional trade, regional integration agreements (RIAs) and the implications for food security. An overview is presented on the present state of African regional integration and the determinants of regional trade in agriculture and food commodities. In particular the

  6. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  7. Regional cooperative agreement for the Asia and Pacific region

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    Among the means available to the International Atomic Energy Agency to promote cooperative efforts in the nuclear field is the Regional Cooperative Agreement (RCA) for Research, Development, and Training related to Nuclear Science and Technology for the Asia and Pacific Region. Under the terms of this agreement, which came into force on June 12, 1972, participating countries aim to promote and coordinate research, development, and training projects in nuclear fields through collaborative efforts among relevant national institutions in the region. The Agency's role is to provide organizational, administrative, advisory, technical, and financial assistance when needed to secure successful execution of the projects undertaken within the framework of the RCA. Although this presentation deals primarily with the benefits of regional cooperation under the agreement, a review of the RCA would be somewhat imbalanced without a mention of its shortcomings. One of the principal impediments to more rapid progress, as is the case in many other areas, is financing. There is no stable source of funding outside the research contract program and, the likelihood of large-scale UNDP support notwithstanding, a greater willingness on the part of participating Member States to support the program along with the development of a greater sense of common purpose are called for. In this connection serious consideration is being given to the possibility of establishing an Asian Centre for Research and Training, an institute that would bring together scientists from the region to collaborate on problems common to the RCA countries. A study group has already been convened to investigate the feasibility of this proposal

  8. Hubs and spokes in Regional Trade Agreements

    NARCIS (Netherlands)

    Vaal, A. de

    2017-01-01

    In the plethora of Regional Trade Agreements (RTAs) some countries are involved in much more RTAs than others. Furthermore, some countries take in a position as a hub: they have trade agreements with many other countries, while their partner countries are much less involved in RTA relations. Even

  9. De Bilateral Security Agreement voor Afghanistan

    NARCIS (Netherlands)

    Voetelink, J.

    2013-01-01

    Wanneer de VS en de NAVO na 2014 de stationering van troepen in Afghanistan willen voortzetten, zullen zij hiervoor nieuwe internationale overeenkomsten moeten sluiten. De onderhandelingen tussen Afghanistan en de VS zijn het afgelopen jaar gestart en moeten leiden tot de Bilateral Security

  10. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  11. AFRA. African Regional Co-operative Agreement

    International Nuclear Information System (INIS)

    1994-04-01

    This publication provides an outline of the African Regional Co-operation Agreement for research, development and training related to nuclear science and technology (AFRA). The agreement stems from an initiative of several African member states of the IAEA to get the agency to help establish an African regional arrangement which would be similar to arrangements which were already in place in the Asian and Latin American regions. Through this regional approach to development, AFRA seeks to accelerate moves toward self-sufficiency in scientific disciplines and appropriate technologies by coordinating intellectual and physical resources and disseminating innovative methods and practices in a cost-effective manner

  12. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  13. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  14. Exploring hubness in Regional Trade Agreements

    NARCIS (Netherlands)

    Vaal, A. de

    2016-01-01

    In the plethora of Regional Trade Agreements (RTAs) some countries take in a more central position than others in the sense that some countries are much more engaged with other countries through RTAs. Furthermore, the position of some countries is that of a hub: they have (many) trade

  15. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  16. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    President George H.W. Bush sought means to influence the policies of Latin American states more effectively. Mexico , particularly in the post-Cold War era...security goals. A review of the U.S. trade policy, and its nesting with the National Security Strategy, demonstrates how President Barack Obama’s... President Barack Obama’s strategic “pivot to Asia,” and the Trans-Pacific Partnership (TPP) trade agreement facilitate U.S. enduring national

  17. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  18. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  19. Regional Security Partners: The Potential for Collective Security

    National Research Council Canada - National Science Library

    Tan, Jimmy

    1999-01-01

    ...." The threat of big power and regional conflicts has diminished. However, the security landscape is now characterized by political fragmentation, Third World chaos, failed states, and ethnic conflicts among others...

  20. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  1. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  2. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  3. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  4. Regional trade agreements & procurement rules : facilitators or hindrances?

    OpenAIRE

    ANDERSON, Robert D.; MÜLLER, Anna Caroline; PELLETIER, Philippe

    2015-01-01

    This Working Paper considers the significance of government procurement chapters in regional trade agreements (RTAs), both in their own right and vis-à-vis the WTO Agreement on Government Procurement (GPA). The paper finds, inter alia, that: (i) a strong complementarity exists between government procurement trade commitments and general goods and services trade commitments, making integration of procurement commitments in a more general system such as the WTO Agreements desirable; (ii) govern...

  5. Regional Trade Agreement and Agricultural Trade in East African ...

    African Journals Online (AJOL)

    Intra-EAC trade is very low, that is, at 9 per cent of the total regional trade, but it is on upward trend. Agricultural trade accounts for over 40 per cent of the intra-EAC trade. This study investigated the effect of EAC regional trade agreement on the regions agricultural trade by analyzing the degree of trade creation and ...

  6. 48 CFR 53.303-DD-441 - Department of Defense DD Form 441, Security Agreement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Department of Defense DD Form 441, Security Agreement. 53.303-DD-441 Section 53.303-DD-441 Federal Acquisition Regulations...-DD-441 Department of Defense DD Form 441, Security Agreement. EC01MY91.163 EC01MY91.164 ...

  7. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  8. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  9. THE ROLE OF REGIONAL TRADE AGREEMENTS IN THE GLOBAL ECONOMY

    Directory of Open Access Journals (Sweden)

    IRINA GABRIELA RADULESCU

    2010-12-01

    Full Text Available Regional and sub-regional groups having an integrative character appeared after the war and they aimed at harmonizing their economic policies, and, at the same time, they ensured, in accordance with the agreed degree of integration, free turnover of goods, products, services, capitals and labor force. By setting up these international economic organizations, the states of the world and especially developing countries wanted to improve their efforts for a sustained economic growth, to counteract the effects of the unequal external affairs and to eliminate underdevelopment. Some of the regional agreements that represent the new regionalism have been motivated politically and they were stimulated by the conviction that good agreements do not necessarily stand for good neighbors. Such agreements consolidate good diplomatic practices and their objective is to reduce the inevitable confrontation that may appear as a result of com

  10. Minimum deterrence and regional security. Section 2. Other regions

    International Nuclear Information System (INIS)

    Azikiwe, A.E.

    1993-01-01

    Compared to European political and security circumstance, minimum deterrence is less an illusion in other regions where weapon free zones already exist. It will continue to be relevant to the security of other regions. Strategic arms limitation should be pursued vigorously in a constructive and pragmatic manner, bearing in mind the need to readjust to new global challenges. The Comprehensive Test Ban Treaty is the linchpin on which the Non-proliferation Treaty rests

  11. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  12. The Paris Agreement on Climate Change: Agriculture and Food Security

    NARCIS (Netherlands)

    Verschuuren, Jonathan

    Climate change has a profound impact on agriculture and on food security. At the same time agriculture contributes to climate change to a considerable extent. Fortunately there is also much to gain since the agricultural sector holds significant climate change mitigation potential through reductions

  13. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  14. India’s Participation In The Regional Trade Agreements

    Directory of Open Access Journals (Sweden)

    V. I. Baronov

    2017-01-01

    Full Text Available The main objective of the proposed study is to identify the specifics of India’s participation in the regional trade agreements (RTAs, a comparative analysis of the main provisions of the RTAs and the impact of membership in the integration agreements on the country’s foreign trade relations. In the world economic literature there is no unity of opinions on the economic effect of the participation of states in RTAs. The author’s thesis is that the final effect of membership in the RTAs depends on the amount of customs duties on the date of signing the agreement (the higher they are, the greater the effect of trade creation, and also on the place of the partner country in the trade of another participating state (the greater is mutual turnover, the greater effect of trade creation. Of course, other factors affect, such as geographical proximity, transportation and other transaction costs. India’s participation in the regional trade agreements (RTA was one of the tasks of implementing the policy “Look East”, which was approved in 1991. The countries of Southeast Asia have been identified as a regional priority, which was caused by the geo-strategic and economic reasons. Later, regional coverage has been extended to the countries of Northeast and South Asia because of increasing the role of China in the world economy and politics, which has become a strategic challenge and economic opportunities for the Indian economy. India is a participant of 13 RTAs, the majority of which are bilateral. In India’s integration practice, one of four types of RTAs is applied: (1 agreement on comprehensive economic partnership, which differ in the widest scope of mutual economic relations; (2 agreement on comprehensive economic cooperation; (3 free trade agreement; (4 preferential trade agreement. Most often, there is used classical integration model (of preferential or free trade area.Initially, the Indian policy of RTA dominated the political factor

  15. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  16. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  17. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  18. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  19. Agreements

    International Nuclear Information System (INIS)

    2001-01-01

    These columns summarize the different bilateral and multilateral agreements concluded recently between the different OECD countries and concerning the nuclear energy domain: Argentina - Australia: Agreement concerning Co-operation in the Peaceful Uses of Nuclear Energy (2001). Argentina - Brazil: Joint Declaration regarding the Creation of the Argentinean-Brazilian Agency for Nuclear Energy Applications (2001). Australia - Czech Republic / Australia - Hungary: Agreements on Co-operation in Peaceful Uses of Nuclear Energy and the Transfer of Nuclear Material (2001). Australia - Indonesia: Arrangement Concerning Co-operation on Nuclear Safeguards and Related Matters (2001). Austria - Switzerland: Agreement on the Early Exchange of Information in the Field of Nuclear Safety and Radiation. Brazil - United States: Extension of the Agreement concerning Research and Development in Nuclear Material Control, Accountancy, Verification, Physical Protection, and Advanced Containment and Surveillance Technologies for International Safeguards Applications (2001). Czech Republic - Republic of Korea: Agreement for Co-operation in the Peaceful Uses of Nuclear Energy (2001). European Union- Russian Federation: Agreements on Nuclear Safety and Controlled Nuclear Fusion (2001). France - United States: Agreement for Co-operation in Advanced Nuclear Reactor Science and Technology (2001). Japan - United Kingdom: Co-operation Agreement on Advanced Nuclear Fuel Cycle, Fast Breeder Reactor and Other Related Technologies (2001). Republic OF Korea - United States: Annex IV Joint Project on Cintichem Technology (2000). Morocco - United States: Protocol amending the Co-operation Agreement on the Peaceful Uses of Nuclear Energy (2001). Multilateral Agreements: Agreement for Information Exchange on Radiological Surveillance in Northern Europe (2001). Status of Conventions in the Field of Nuclear Energy. (author)

  20. 12 CFR 725.20 - Repayment, security and credit reporting agreements; other terms and conditions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Repayment, security and credit reporting agreements; other terms and conditions. 725.20 Section 725.20 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION CENTRAL LIQUIDITY...

  1. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  2. Talking in Taejon : regional cooperative agreement project formulation meeting

    International Nuclear Information System (INIS)

    McEwan, A. C.

    1997-01-01

    The International Atomic Energy Agency as part of its Regional Cooperative Agreement (RCA) with countries in east Asia and the neighboring Pacific, has had a project on strengthening radiation protection infrastructures operating for some years. This project has arranged training courses, workshops and other activities on a range of topics related to establishing or improving radiation protection measures and safety of radiation sources in member states of the region. A second 5 year phase of planned activities is to be concluded during 1997, and the value of the project is such that member coutntries proposed its continuation for a further 5 year period commencing in 1998. For this purpose a Task Group took the lead in assembling and evaluating proposals for consideration and approval at a meeting of national coordinators for the project held in Taejon Korea, 24-28 February. The RCA project for Phase III will be titled Enhancement and Harmonisation of Radiation Protection. The meeting of national coordinators from the region represents a unique opportunity for information sharing and cooperation in radiation protection betweem countries. (author)

  3. Security Situation in China’s Neighboring Regions: New Changes

    Institute of Scientific and Technical Information of China (English)

    ZHU FENG

    2016-01-01

    Recent Development of Security Structure in East Asia Region:Alliance Politics Has Entered a New Strategic Active Stage Since the end of the Cold War in1991,the East Asia Region has witnessed quite a number of changes in security situation.However,there have been no decisive changes in regional security order,power distribution or the strategic choices of major states in the region.The Obama Adminis-

  4. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  5. The Current Status of the Economic Security of Poltava Region

    Directory of Open Access Journals (Sweden)

    Bondarevska Olha M.

    2017-12-01

    Full Text Available The status of economic security of Poltava region in 2012–2016 was analyzed, the analysis was conducted using the developed methodology for assessing economic security of region, which is based on the joint use of indicative and functional methods. In order to assess the status of economic security of region, a system of indicators, divided by economic security components, has been formed using functional approach. The information-analytical provision of assessment has been formed using statistical information on the socio-economic development of the region. The influence of factors of destabilizing and destimulative nature on the status of economic security of the region has been researched. It has been concluded that the economic security of Poltava region is unsatisfactory, despite the existence of some positive tendencies, which at present are not sustainable.

  6. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  7. Food security in the MENA region: the imperative rehabilitation of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Food security in the MENA region: the imperative rehabilitation of agriculture ... Overcoming the food security challenge necessarily requires sustainably ... Local climate change data is securing food and livelihoods in southern Africa ... Copyright · Open access policy · Privacy policy · Research ethics ...

  8. Achieving water security through community-based agreements in rural Northwestern Costa Rica

    Science.gov (United States)

    Bautista Solís, P.; Bommel, P.; Campos, X.; Suarez, A.; Leclerc, G.

    2016-12-01

    Community-based drinking water organizations have the responsibility in supplying water for domestic use to 29% of the Costa Rican population. Nowadays, more than 1.500 of these organizations face important challenges for achieving this critical mission, such as fulfilling national drinking-water quality standards, and improving their organization and administration to secure water supply and distribution under climate change. We conducted action-research in two communities with similar geographical and demographic conditions: Cuajiniquil and Colas de Gallo located in the drought prone Guanacaste region in Costa Rica. Both communities are contrasted regarding to their assets and organization. We addressed the following research question: Can a participatory process help communities assess the situation of their aqueduct and its management, project themselves in the future, and build more resilient strategies to face domestic water restrictions? Through 16 participatory sessions, we adapted the Wat-a-Game (WAG) toolkit to the problem of domestic water provision in these communities, creating the WAG-Tico role-playing game. This was complemented by two other activities: visits by regional actors sharing their experience, and exchange visits between both communities for cross-learning about community-based water management. The process resulted in a locally-led collaboration between both communities and the emergence of community commitments for improving drought resilience. WAG-Tico sensibilized participants to appreciate the value of community organization and the impacts of climate change on water supply, and develop aqueduct management rules. Exchange visits and regional actors interventions promoted opportunities for accessing to external resources (i.e. social, human and financial). Colas de Gallo created its first water committee for building a community aqueduct and their first drilled well. Cuajiniquil has committed in protecting its water springs, organized

  9. INTRODUCTION: DESERTIFICATION AND SECURITY - PERSPECTIVES FOR THE MEDITERRANEAN REGION

    Science.gov (United States)

    This book focuses on two basic concepts: security and desertification in the Mediterranean Region and their linkages. It emerged from a single meeting of the "Workshop on Desertification in the Mediterranean Region. A Security Issue" held in Valencia, Spain on 2-5 December 2003...

  10. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  11. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  12. Information security of power enterprises of North-Arctic region

    Science.gov (United States)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  13. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  14. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  15. Regional cooperation based on multilateral international agreements in nuclear field

    International Nuclear Information System (INIS)

    Valcic, I.

    1996-01-01

    Multilateral international agreements have defined the framework of behavior and cooperation in various fields and aspects of peaceful use of nuclear energy. Thus, obligations have been defined in the following areas: nonproliferation of nuclear weapons, physical protection of nuclear material, liability for nuclear damage, nuclear safety, early notification about a nuclear accident and assistance in case of nuclear accident. Obligations regarding radioactive waste management should be defined soon. This paper gives a review of obligations from particular agreements with a special emphasis on those which are being realized through mutual cooperation of concerned countries and are important for safe use of nuclear energy. (author)

  16. Indonesian Sea Power and Regional Maritime Security Challenges

    Directory of Open Access Journals (Sweden)

    Marsetio Marsetio

    2017-07-01

    Full Text Available The main objective of this paper is to examine the regional maritime security challenges facing Indonesia. As it is known that entering to the 21st century has come a new term in regional architecture in the Asia-Pacific region, namely the Indo-Pacific region. This region consists of the Indian Ocean and Pacific. Both of these areas became more interconnected than in the previous period. These two regions became a single, significant system in the global order. Key players in the Indo-Pacific region are China, India and the United States. Of course, their actions have created new challenges in maritime security. These challenges include maritime disputes, pirates, and maritime power competition. The dispute in the South China Sea has spawned a security problem in the Asia Pacific region that Indonesia must face in the future.

  17. Food and nutrition security in the Hindu Kush Himalayan region.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra

    2018-01-01

    The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  18. Toward a Regional Security Architecture for the Horn of Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Moreover, conflict in one country tends to affect its neighbours, mainly through the flow of refugees and weapons. Building on work carried out during Phase I ... Extrants. Rapports. Towards Developing a Regional Security Architecture for the Horn of Africa: Developing Responses to Human (In) Security-Phase Two ...

  19. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  20. Emerging Regional Energy Security Issues China

    Science.gov (United States)

    2009-09-29

    moving toward European standards and taxation of least efficient vehicles www.csis.org | 7 China’s Energy Strategy - Clean Power Generation...Project Type of Contract Signature Date Estimated Value Contractor(s) Remarks Malaysian Amona (Main Contractor), Chinese COSL and CNOOC The first...infrastructure. List of Upstream Agreements Between Iran and China in Recent Years ** The original buyback contract w as signed betw een Malaysian Amona and

  1. How Do Professional Mutual Recognition Agreements Affect Higher Education? Examining Regional Policy in North America

    Science.gov (United States)

    Sa, Creso; Gaviria, Patricia

    2011-01-01

    Professional mutual recognition agreements (MRAs) are one of the policy instruments employed in global and regional trade agreements to facilitate the mobility of skilled labour. While such agreements have been noted in the literature examining cross-border academic mobility, little is known about how they impact higher education. This paper…

  2. A Comparative Analysis of Trade Facilitation in Selected Regional and Bilateral Trade Agreement

    OpenAIRE

    Institute for International Trade

    2006-01-01

    This study compared the treatment of trade facilitation in four selected regional trade agreements, AFTA, APEC, SAFRA and PACER, and in one bilateral free trade agreement being the Australia-Singapore Free Trade Agreement (ASFTA), with a view to determining model trade facilitation principles and measures which may be instructive for developing country negotiations and policy makers.

  3. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  4. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  5. Regional Collaboration Among Urban Area Security Initiative Regions: Results of the Johns Hopkins Urban Area Survey

    Science.gov (United States)

    Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073

  6. Regional collaboration among Urban Area Security Initiative regions: results of the Johns Hopkins urban area survey.

    Science.gov (United States)

    Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.

  7. The Text of the Fifth Agreement to Extend the 1987 Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2012-01-01

    The Text of the Fifth Agreement to Extend the 1987 Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status [es

  8. REGIONAL TRADE AGREEMENTS AND COMPETITION POLICY. CASE STUDY: EU, ASEAN AND NAFTA

    Directory of Open Access Journals (Sweden)

    Fora Andreea-Florina

    2014-07-01

    Full Text Available The large number of regional trade agreements notified to the World Trade Organization (WTO significantly influenced the flow of world trade. By April 2014 there had been notified 583 regional trade agreements to the WTO, of which only 379 are in force. The objective of this paper is to highlight the importance of regional trade agreements in world trade, especially the importance of establishing a regional competition policy in these agreements. The research methodology used is the analysis of legislation governing preferential trade agreements at the level of WTO, the collection and interpretation of statistical data provided by the WTO Secretariat, the case study, namely the study of literature. The paper is structured in three parts. The first part of the paper examines the basic laws based on which regional trade agreements are notified to the WTO and the evolution of these agreements in the period 1958-2013. The second part of the paper is devoted to the analysis of competition policy in regional trade agreements. In this part of the paper, to highlight the patterns of competition policy adopted under these agreements was analyzed by three case studies of competition policy in the EU, ASEAN and NAFTA. The three case studies have revealed that the three preferential trade agreements present regional competition policies with varying degrees of integration. The most complex form of competition policy is found in the European Union, because we are talking about a centralized model of competition policy. ASEAN presents a partially decentralized model, while NAFTA scrolls with a decentralized model of competition policy. The last part of the paper presents the characteristics of the four models of competition policy identified in the preferential trade agreements in force. It should be emphasized that if the initial preferential trade agreements have not put a great emphasis on the rules of competition policy, practice has shown the importance

  9. Demographic aspects of social security in region

    Directory of Open Access Journals (Sweden)

    Alla Gennad'evna Leont'eva

    2012-06-01

    Full Text Available This paper presents a situational analysis of the level of life safety in the field of demographic regions of the Ural Federal District. The analysis is based on data from the Federal Statistics and covers the period 2000-2010. We have developed a system of indicators for evaluating safety in the demographic sphere. We set the main threats to the social and economic stability in the regions. The system of thresholds includes three blocks: the reproduction of the population, marriage and family relationships and health. We have presented a quantitative description of the main threats. Identified priority areas of social protection, providing increased stability of the regional socio-economic development, reducing the likelihood of social conflicts and improve the demographic situation.

  10. The Text of the Agreement of 8 July Extending the Asian Regional Co-Operative Project on Food Irradiation. Extension Agreement

    International Nuclear Information System (INIS)

    1983-12-01

    The text of the Agreement to Extend the Agreement of 23 May 1980 Establishing the Asian Regional Co-operative Project on Food Irradiation within the framework of the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972, as extended in 1977 and in 1982, is reproduced herein for the information of all Members

  11. Disarmament and security issues in the Asia-Pacific region

    International Nuclear Information System (INIS)

    1992-01-01

    The main issues of the conference were focused on current political trends related to outstanding disputes between the state in Asia-Pacific region. Second cluster od issues which merits careful examination was concerned with the relevance of various arms control and disarmament measures. The tools of arms control and disarmament are proving to be more versatile, flexible instruments for security-building than was the case during the cold-war period. The third item of interest for many states in the Asia-Pacific region is the question of promoting new forums for regional dialogues on security matters

  12. Regional Military Security Cooperation in North America

    Science.gov (United States)

    2009-12-11

    North America, Europe, Russia, Japan, South Korea, China, India , Australia, New Zealand, South Africa, Argentina, Brazil, and Chile.24 The Non...Sea.47 Additionally, he sees competition and conflict over water arising in the river basins of the Nile, Jordon, Tigris, and Euphrates rivers . This... interlinks with oil competition, as it is the same geographic region.48 Finally, he views Africa as an additional hot spot as there are many

  13. INTEGRATED ESTIMATION OF FOOD SECURITY IN THE REGION (BY THE EXAMPLE OF SAMARA REGION

    Directory of Open Access Journals (Sweden)

    Svetlana I. Nesterova

    2015-01-01

    Full Text Available The article presents a model of integrated assessment of food security in the region. A comprehensive analysis of food security in the Samara region in the dynamics is given, and its results are compared with the numbers of the Volga Federal District as a whole. Recommendations on further improvement of the agricultural sector are suggested.

  14. Danish Interests in Regional Security Institutions in East Africa

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    For the past decade, peace and security in East Africa have gained increasing focus internationally. The region has experienced armed conflicts, civil wars, rebellion, drought and famine. Yet, at the same time, there is an emerging ambition among a number of African states to handle security issues...... on the continent independently. Such ambitions have fostered a variety of military capacity building programmes supported by external donors. The present report explores how up until now Denmark has sought to contribute to strengthening political and military security in East Africa. This has mainly been done...... through capacity building projects anchored in different regional security institutions. The report illuminates some of the risks that such capacity building projects might confront. Furthermore the report points out some of the challenges that exist in the cooperation between the Ministry of Foreign...

  15. Control Mechanism and Security Region for Intentional Islanding Transition

    DEFF Research Database (Denmark)

    Chen, Yu; Xu, Zhao; Østergaard, Jacob

    2009-01-01

    in the grid. The concept of Islanding Security Region (ISR) has been proposed as an organic composition of the developed control mechanism. The purpose of this control mechanism is to maintain the frequency stability and eventually the security of power supply to the customers, by utilizing resources from...... generation and demand sides. The control mechanism can be extended to consider the distributed generations like wind power and other innovative technologies such as the Demand as Frequency controlled Reserve (DFR) technique in the future....

  16. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http

  17. Modern Integration Processes in the Asia-Pacific Region: the Formation of Trans-Regional Mega-Agreements

    Directory of Open Access Journals (Sweden)

    Maliuta Iryna A.

    2017-12-01

    Full Text Available In the 21st century, especially in the last decade, new intercontinental integration projects appear on the global stage with a high potential for influencing the regional economic structure and at the same time bearing certain challenges for the international geo-economic and geo-political map of the world. Comprehensive new-generation inter-regional agreements are being formed, such as the TTP, the TTIP, the RCEP, the Comprehensive Economic and Trade Agreement between Canada and the EU (CETA, the Japan-EU Economic Partnership. The Asia-Pacific region has been an active participant in the creation and promotion of mega-regional trade agreements. Mega-regional trade agreements in the Asia-Pacific region, namely the TTP and the RCEP, are analyzed as mega-projects with an unprecedented scale of liberalization within the framework of the agreement that include provisions complementing the WTO framework or extending beyond it. There identified reasons for the emergence of mega-regional trade agreements and prospects for the implementation of these projects, as well as possible consequences for the international economic system. It is established that new trans-regional projects, providing certain advantages to the participating countries, simultaneously carry both opportunities and challenges for the world economy. The latter are associated with the threats of crowding the countries that do not take an active part in the integration processes out of the global chains of value creation as well as of the processes of international trade.

  18. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency.

  19. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1961-01-01

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency

  20. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1961-01-01

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [es

  1. Comprehensive Assessment of Industries Economic Security: Regional Aspect

    Directory of Open Access Journals (Sweden)

    Viktoriya Viktorovna Akberdina

    2017-12-01

    Full Text Available The article investigates the interaction of the forms of network integration and the development of complimentary production networks in terms of economic security. Currently, the most developed countries are occurring a transition from the industrial society to the information society. The industry 4.0 as the continuous communication at all levels and characterizes the production processes, in which technologies and devices interact automatically in the value-added chain. Under these new conditions, the former types of organizational structures of economic entities are not sufficiently effective. Therefore, there is a need to create new, modern types of organizational structures. One of these types is network structures. Currently, they are becoming characteristic features of the new economy. Regional economic security depends on internal and external threats, which lead to unstable situations. Regional crisis situations are influenced by both macroeconomic crisis processes and local features of economic and social development, as well as the resource potential, geographical location, national and other peculiarities. The article defines the specific characteristics of the regions of the Ural Federal District, as well as the current situation of the regional economy and threats to the region. The authors have evaluated the economic security of complimentary production networks at the regional level. This evaluation has revealed the interconnection between complimentary production networks and the construction industry in the national economy. We have defined the economic security of complimentary production networks and specified the concept of complimentary production networks. The research findings may be applied by organizations as a new perspective of industry using network forms related to economic security

  2. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  3. The Text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, extended first in 1977 and then in 1982, for a further period of five years with effect from 12 June 1987, is reproduced herein for the information of all Members [fr

  4. The Text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1982-12-01

    The text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, fist extended in 1977, for a further period of five years with effect from 12 June 1982, is reproduced herein for the information of all Members

  5. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  6. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  7. The Text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Latest Status. Extension of Agreement

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, t he 1987 RCA , is reproduced herein for the information of all Members [es

  8. The Text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members [es

  9. The Text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members

  10. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  11. Substantiation the strategic priorities of innovation regional development security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2014-09-01

    Full Text Available In this article are discussed methodological challenges for strategic priorities ensure security innovation regional development. It is shown that in modern conditions innovative safety is an independent and very important area of security of the region. This innovative security should be understood as a qualitative characteristic that gives insight into the regional socio-economic systems requirements and challenges of the innovation economy, including their ability to recombination. It is considered the basic patterns and features of mutual influence and interaction of innovative and traditional socio-economic development of the territories. The necessity of the joint integrated treatment of innovation and socio-economic development in the management of innovative safety of the region is founded. It is given suggestions on fundamental approaches to the solution of the problem of selecting priority areas for strengthening the sources of innovation development successfully tailored to specific territories. The main positions are illustrated in the example the regions of the Ural Federal District.

  12. Regional security in Southeast Asia and the South Pacific

    International Nuclear Information System (INIS)

    Pande, Amba

    2002-01-01

    Ever since the weapons of mass destruction have become an international currency of power, the efforts for their control and elimination have also developed simultaneously, as an important stream in international politics. Countries all over the globe have strived to evolve various devices to ensure security against these weapons at international, regional as well as national levels. One such regional effort for nuclear arms control is the creation of nuclear-free zone. The nuclear free zones present a potentially effective option to supplement the global nuclear disarmament regime. This is an endeavour towards crisis management, reducing the threat perception, common security and confidence building. In addition, they help in creating a regional security order by developing a code of conduct which binds external actors as well as the regional countries. They are meant to reduce if not eliminate the likelihood of a region getting involved into the war of mass destruction. It is in this context the cases of Southeast Asia and the South Pacific nuclear-free zones have been discussed in this book

  13. Minimum deterrence and regional security. Section 1. Europe

    International Nuclear Information System (INIS)

    Gnesotto, N.

    1993-01-01

    The impact of regional security in Europe on the minimum nuclear deterrence is analyzed. There are four factors that enable definition of specific features of European security. Europe is the only theatre in which four of the five nuclear Powers coexist, where three states, Ukraine, Belarus and Kazakhstan, represent a new type of proliferation. It is therefore the strategic region with the heaviest concentration of nuclear weapons in the world. Finally it is a theatre in which regional wars are again a possibility. In other words, the end of cold war meant return of real wars in Europe on one hand, and on the other, a combination of absolutely massive and essential nuclear capability and over-increasing economic, political and diplomatic instability. In spite of these circumstances nuclear deterrence in Europe is inevitable and desirable

  14. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    Full Text Available The article is aiming at the study of environmental hazards in Zhytomir region. Its main objective is to identify the set of adverse factors affecting the state of danger and compose a necessary starting material for the prediction of possible negative consequences, their nature and extent. The matter of special importance for the study of the phenomenon of security is the security classification. First of all, the forms (system of security in relation to the forces and processes of natural, social and technical character should be distinguished. They can be defined as systems of geo-bio-physical, social and technical security. The classification of security can be determined in many ways, for example, in relation to the object of security; in relation to the subject of security; according to the problem indication; according to the functional indication. Security is a distinctive characteristic and prerequisite of life, progressive development and viability of real-world objects. The methodology of its evaluation is based on the states of the essence of natural and anthropogenic environmental pollution, the standard requirements for the quality of environmental objects and standards of acceptable contamination. The assessment of ecological security of the environment is the quantitative measure of parameters of environmental pollution dangers, threats and risks of natural character as well as the state of anthropogenic security. This assessment is carried out according to the methods and ways to measure environmental parameters. For this purpose it is important to know the factors of danger and the system of indicators that characterizes all natural and environmental phenomena and processes of geo-ecological dangers, natural environmental conditions, ecological condition. The system of natural and industrial environmental indicators consists of the indicators which characterize all phenomena and processes of geo-ecological dangers of natural

  15. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  16. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  17. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  18. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  19. Sustainability and Security: Timber Certification in Asia-Pacific Region

    Directory of Open Access Journals (Sweden)

    Antonina Ivanova

    2008-10-01

    Full Text Available The expansion of sustainable development initiatives since the 1990’s reflected an emphasis on integrated solutions to economic development, socio-political stability and environmental health in the global community. In the same context the traditional concept of security needed to be open in two directions. First, the notion of security should no longer be applied only to the military realm, but also to the economic, the societal, the environmental, and the political fields. Second, the referent object of the “security” should not be conceptualized solely in terms of the state, but should embrace the individual below the state, and the international system above it. The forests industry timber certification in Asia-Pacific region has been selected as a case study because it is an excellent example to illustrate the links between the sustainable development and the environmental security, including also certain elements of economic security. This article is presenting a critical overview of the forest industry and the status of timber certification globally, with an emphasis on Asia – Pacific countries applying the Systemic Thinking approach. In conclusion, an outlook is presented concerning the future of timber certification and possible impacts on security and sustainable development.

  20. EVALUATION OF ECONOMIC SECURITY NOVOSIBIRSK REGION (FOR EXAMPLE, A REGIONAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Lugacheva L. I.

    2014-12-01

    Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.

  1. African Regional Co-operative Agreement for research, development and training related to nuclear science and technology. Extension of agreement

    International Nuclear Information System (INIS)

    1995-01-01

    Pursuant to Article XIV.2, the Agreement ''shall continue in force for a period of five years from the data of its entry into force and may be extended for further periods of five years if the Government Parties so agree''. The extension of the Agreement entered into force on 4 April 1995, upon expiration of the original Agreement

  2. African Regional Co-operative Agreement for research, development and training related to nuclear science and technology. Extension of agreement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-05-10

    Pursuant to Article XIV.2, the Agreement ``shall continue in force for a period of five years from the data of its entry into force and may be extended for further periods of five years if the Government Parties so agree``. The extension of the Agreement entered into force on 4 April 1995, upon expiration of the original Agreement.

  3. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    Science.gov (United States)

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  4. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  5. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  7. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  8. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  9. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  10. The text of the agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology, 1987

    International Nuclear Information System (INIS)

    1992-09-01

    The document reproduces the text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987, for a further period of five years with effect from 12 June 1992. Australia, Bangladesh, the People's Republic of China, India, Indonesia, Japan, the Republic of Korea, Malaysia, Pakistan, the Philippines, Singapore, Sri Lanka, Thailand and Viet Nam are parties of this Agreement

  11. African Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology. Third extension of agreement

    International Nuclear Information System (INIS)

    2005-01-01

    Pursuant to Article XIV.2, the Agreement 'shall continue in force for a period of five years from the date of its entry into force and may be extended for further periods of five years if the Government Parties so agree'. The third extension of the Agreement entered into force on 4 April 2005, upon expiration of the second extension of the Agreement and will remain in force for an additional period of five years, i.e. through 3 April 2010. As of 10 May 2005, 20 States have notified the Agency of their acceptance of the extension of the Agreement. The status list of the Agreement is reproduced in this document for the information of all Members. Members will be notified of further acceptances of the extension of the Agreement by addenda to this information circular

  12. The text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The full text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972 (INFCIRC/167) (extended first in 1977 and then in 1982) for a further period of five years with effect from 12 June 1987, is reproduced

  13. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Acceptance of the Agreement by Bangladesh

    International Nuclear Information System (INIS)

    1974-01-01

    On 23 October 1974 the Government of Bangladesh notified the Agency of its acceptance of the Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States, in accordance with Section 9 thereof. Pursuant to Section 10, the Agreement consequently entered into force with respect to the Government of Bangladesh on that date

  14. The text of the second agreement to extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology

    International Nuclear Information System (INIS)

    1998-03-01

    The document reproduces the text of the Second Agreement to Extend the 1987 Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology for a further period of five years with effect from 12 june 1997, i.e., through 11 June 2002

  15. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  16. 7 CFR Guide 1 to Subpart G of... - Project Management Agreement Between the ____ Regional Commission and the Farmers Home...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Project Management Agreement Between the ____ Regional... Guide 1 to Subpart G of Part 1942—Project Management Agreement Between the ____ Regional Commission and... successor agency under Public Law 103-354, in concurring to this Project Management Agreement, hereby...

  17. African Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology. Fourth Extension of Agreement

    International Nuclear Information System (INIS)

    2010-01-01

    Pursuant to Article XIV.2, the Agreement 'shall continue in force for a period of five years from the date of its entry into force and may be extended for further periods of five years if the Government Parties so agree'. The fourth extension of the Agreement entered into force on 4 April 2010, upon expiration of the third extension of the Agreement and will remain in force for an additional period of five years, i.e. through 3 April 2015. As of 30 April 2010, 8 States have notified the Agency of their acceptance of the extension of the Agreement. The status list of the Agreement is reproduced in this document for the information of all Members [es

  18. Approaches to regional security and arms control in North-East Asia: Tasks ahead

    International Nuclear Information System (INIS)

    Lee Seo-Hang

    1992-01-01

    In order to pave the way towards regional security and arms control in North-East Asia, one of the outstanding issues left over from the cold war, that is, the question of a divided Korea-must be solved first. In settling the Korean problem, the importance of the bilateral negotiation between the parties in direct conflict can never be overemphasized. Over the past few years, fortunately, there has been an accumulation of developments that would have a positive effect on the improvement of inter-Korean relations and peaceful unification of the peninsula. In this sense, the first challenge for the two Koreas is to fulfil the pledges that they committed in the agreements. Concluding agreements is only a first step. They must be implemented fully both in letter and in spirit. Only upon the sincere and complete translation of the agreements into action can the two Koreas establish a solid peace system and move towards unification. This fulfilment will eventually contribute to security and stability in North-East Asia. To emphasize the importance of bilateral negotiation between the two Koreas is not necessarily to exclude the role of external Powers. The four major Powers in North-East Asia-China, Japan, Russia and the United States - could support the South-North dialogue, help ease tensions, facilitate discussion of common security concerns and possibly guarantee the outcomes negotiated between the two Koreas. By fostering bilateral negotiation between the parties to the conflict, they could contribute to enhancing security, confidence and disarmament in the region. At this moment, the most urgent task in the Korean peninsula relates to the problem of Pyongyang's nuclear weapons programme. To solve the nuclear problem, a significant progress on mutual reciprocal inspections must be made immediately in accordance with the wordings of the Declaration. Mutual inspection will test whether Pyongyang intends to go towards nuclear weapons, or away from them and towards

  19. WTO’s information technology agreement (ITA and its expansion (ITA II: multilateralizing regionalism

    Directory of Open Access Journals (Sweden)

    Camilla Capucio

    2018-03-01

    Full Text Available Bearing in mind the complex context of the relationship between multilateralism and regionalism, the conclusion of plurilateral agreements within the WTO, open to participation of all interested members, offers a multilateral perspective of regionalism, in which the benefits of partial consensus are to be extended to the multilateral sphere. The ITA - Information Technology Agreement - is mentioned as an example of this possibility, and its recent expansion, through the negotiation of the ITA II, demonstrates the strengthening of this multilateralisation trend of regionalism, although with special features. Thus, this article is developed drawing the context and introduction of the theme of regionalism and multilateralism, and presents the theory of multilateralisation of regionalism and the ITA as one of those experiences, and its recent expansion as a resumption of the relevance of this theory. Considering the impasses for the conclusion of the Doha Round, the expansion of these partial consensus and the continuation of negotiations at the World Trade Organization by the conclusion of sectoral plurilateral agreements emerges as a possible way out, which demands a re-architecture of the interpretation of the role of the WTO in the global economic governance.

  20. Regional Cooperation Agreement for Asia and the Pacific (RCA). A mechanism for nuclear technology transfer

    International Nuclear Information System (INIS)

    Bin Muslim, N.

    1993-01-01

    The paper presents the regional cooperation programs of the IAEA which have as purpose to promote the applications of peaceful uses of atomic energy and to transfer technology to the developing countries. The paper focusses on the (RCA) program for Asia and the Pacific, it is considered the most important mechanism for genuine technology transfer. The annex no 1 lists the full text of the Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (13 articles). The annex no.3 lists also the full text of the African Regional Cooperative Agreement for Research, Development and training Related to Nuclear Science and Technology (14 articles). 11 refs., 17 tabs

  1. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  2. A regional proposal for reinforcing nuclear and radiological security

    International Nuclear Information System (INIS)

    Puig, Diva

    2008-01-01

    This paper gives information about the phenomenon of globalization and the regional process of integration that have generated new and challenging characteristics in criminal actions, that has generated a trans national dimension. In this frame, the illicit trafficking of radioactive material is a matter of concern. After the terrorist attacks of September 11, 2001, it is a new reality that for certain terrorist groups, exposition to radiation ionizing with the purpose of committing a terrorist act is not more an obstacle. The use of a 'dirty bomb'. by terrorists is considered probable. The orphan sources represent a serious threat to security and must be: identified, located, recovered, and assured. Many radioactive materials with hundreds of applications in medicine, research and industry are lost or robbed. There are countries that have not a registry of such orphan sources. The IAEA Illicit Trafficking Data Base (ITDB) was established in 1993.There were 103 confirmed incidents of illicit trafficking and other unauthorized activities involving nuclear and radioactive materials in 2005. Nevertheless INTERPOL registers a much greater number of cases. The IAEA tries to increase the capacity of Member States to protect their facilities and nuclear fuels, storage and transport against acts of nuclear terrorism. In this paper I propose the creation of an Inter-American Committee Specialized in the Prevention and Control of the Illicit Trafficking of Radioactive and Nuclear Material at Pan-American level and within the framework of O.A.S., according to the Chart of the Organization of American States , and considering the respect to the sovereignty of the States and the principle of not intervention, with the purpose of developing the cooperation in order to prevent and to prevent and to control the illicit trafficking of radioactive and nuclear material. Its principal objective would be to develop a cooperation and a common approach of nuclear and radiological

  3. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    Science.gov (United States)

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

  4. Canada and the North American Free Trade Agreement: Between globalization and regional integration

    Directory of Open Access Journals (Sweden)

    Caterina García Segura

    1995-07-01

    Full Text Available The aim of the present article is to analize, from Canada’s perspective, the choice regarding the model of state as well as of economic and commercial policy which the decision to participate in the North American Free Trade Agreement (NAFTA implies. The debatewhich NAFTA provoked in Canada expresses in concrete terms that debate which, in much larger terms, takes place at the international level regarding the multilateralization and/or the regionalization of commercial exchanges. It is a reflection of the tension between theintegrating forces (process of globalization and the fragmenting ones (processes of regionalization which characterize the dynamics of the contemporary international system. The hypothesis of this work is that in spite of being a commercial agreement, the Canadian government’s decision to participate in NAFTA was a decision of a political nature which was not determined exclusively by the reality of the existing commercial exchanges between Canada and Mexico or by the perspectives of improving them inthe short term. The immediate objective of Canada was to avoid that a possible bilateral agreement between its prinicipal economic member, the United States, and Mexico would empty out the contents of the existing Free Trade Agreement (FTA between Canada and the United States. In this sense, NAFTA was the possible remedy to an unwanted situation (the negotiation of a US-Mexico bilateral agreement. The objective in the medium and long term is use the platform of regional integration as a trampoline from where the Canadian economy can be reorientated and driven in order to attain international competitiveness. In this sense, Canada’s true option had already beenrealised with the FTA.

  5. U.S. Security-Related Agreements in Force Since 1955: Introducing a New Database

    Science.gov (United States)

    2014-01-01

    necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax -deductible charitable contribution at www.rand.org/giving... inherited by a now independent colonial state. We also include an 4 The process becomes somewhat more...Madagascar 2 Malawi 3 Malaysia 8 Maldives 3 52 Partner Number of Agreements Mali 7 Malta 4 Marshall Islands 4 Mauritania 3 Mauritius 3 Mexico

  6. Non-conventional provisions in regional trade agreements : do they enhance international trade?

    OpenAIRE

    Hayakawa, Kazunobu; Kimura, Fukunari; Nabeshima, Kaoru

    2011-01-01

    The scope of recent regional trade agreements (RTAs) is becoming much wider in terms of including several provisions such as competition policy or intellectual property. This paper empirically examines how far advanced, non-conventional provisions in RTAs increase trade values among RTA member countries, by estimating the gravity equation with more disaggregated indicators for RTAs. As a result, we find that the provision on competition policy has the largest impacts on trade values, followin...

  7. Evaluating energy security in the Asia-Pacific region: A novel methodological approach

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2010-01-01

    This paper establishes an 'energy security assessment instrument' based on a new and expanded conceptualisation of energy security. The instrument is a systematic interrogative tool for evaluating energy security of individual states or regions. It consists of eleven broad energy security dimensions associated with the current global energy system. These energy security dimensions take into account numerous quantitative and qualitative attributes of each country's energy security and policy, and include both traditional energy security concerns and many new factors, such as environmental, socio-cultural and technological. Another dimension, largely absent from previous analyses, is the existence of, and the issues addressed in, energy security policy in each country. This instrument serves as an assessment system with which to evaluate energy security in the Asia-Pacific region. The existing studies on energy security in the Asia-Pacific region suffer from serious limitations. No study to date examines regional energy security policies by adopting a more comprehensive energy security definition as a starting point. Most studies also focus on a single country or issue. Even if they examine energy security in major regional economies, they lack critical comparative analysis. The instrument is valuable as it may be utilised to draw a comprehensive map of regional energy security situation, which can also include comparative analysis of energy security characteristics across the Asia-Pacific region. Ultimately, it may be utilised to set up a framework for improved regional energy cooperation with the aim of providing regional leaders with a blueprint for improving regional energy security and policy.

  8. Disentangling regional trade agreements, trade flows and tobacco affordability in sub-Saharan Africa.

    Science.gov (United States)

    Appau, Adriana; Drope, Jeffrey; Labonté, Ronald; Stoklosa, Michal; Lencucha, Raphael

    2017-11-14

    In principle, trade and investment agreements are meant to boost economic growth. However, the removal of trade barriers and the provision of investment incentives to attract foreign direct investments may facilitate increased trade in and/or more efficient production of commodities considered harmful to health such as tobacco. We analyze existing evidence on trade and investment liberalization and its relationship to tobacco trade in Sub-Saharan African countries. We compare tobacco trading patterns to foreign direct investments made by tobacco companies. We estimate and compare changes in the Konjunkturforschungsstelle (KOF) Economic Globalization measure, relative price measure and cigarette prices. Preferential regional trade agreements appear to have encouraged the consolidation of cigarette production, which has shaped trading patterns of tobacco leaf. Since 2002, British American Tobacco has invested in tobacco manufacturing facilities in Nigeria, Kenya and South Africa strategically located to serve different regions in Africa. Following this, British America Tobacco closed factories in Ghana, Rwanda, Uganda, Mauritius and Angola. At the same time, Malawi and Tanzania exported a large percentage of tobacco leaf to European countries. After 2010, there was an increase in tobacco exports from Malawi and Zambia to China, which may be a result of preferential trade agreements the EU and China have with these countries. Economic liberalization has been accompanied by greater cigarette affordability for the countries included in our analysis. However, only excise taxes and income have an effect on cigarette prices within the region. These results suggest that the changing economic structures of international trade and investment are likely heightening the efficiency and effectiveness of the tobacco industry. As tobacco control advocates consider supply-side tobacco control interventions, they must consider carefully the effects of these economic agreements and

  9. Competitiveness and food security at the regional level

    Directory of Open Access Journals (Sweden)

    Mikhail Vasil'evich Fyodorov

    2012-06-01

    Full Text Available This paper deals with food safety as one of the areas of food security and food sovereignty. A review of concepts, models, acts on the power of international and national levels is made. The authors formulate a conclusion about the need for a measure of «food quality» with the release of the functional components of fitness (the ability to perform specified functions with the purpose and safety (restrictions on the content of harmful substances in the products. The analysis of the competitiveness of local products is made on the quality characteristics based on the proportion of output indicator of inadequate quality or dangerous to health in the total volume of products placed on the market. The paper identifies key areas of federal and regional levels to comply with the quality of food.

  10. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  11. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2014-04-01

    Full Text Available User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks. In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  12. The Asia-Pacific Region on the Paris Agreement against Climate Change: Geopolitics and Cooperation

    Directory of Open Access Journals (Sweden)

    Ana Bertha Cuevas Tello

    2017-11-01

    Full Text Available Given the complexity surrounding climate change, it is argued that the willingness to cooperate on the part of the States is based on one of the faces that, for the climate field, can offer geopolitics: strengths or weaknesses (understood as vulnerability of geographical conditions, location and territory. That is, the physical, geographic, economic and demographic factors of each State influence the decision making of the foreign climate policy, which induces them to cooperate or the abstention of it. This paper will address, broadly speaking, the participation of the main economies of the Asia-Pacific region in the institutionalization of climate change in the International Agenda; the importance of the economies of the Asia-Pacific region with regard to the Paris Agreement; and the geopolitical strengths and weaknesses that explain the cooperative or non-cooperative behavior of the region in the fight against climate change.

  13. Non-proliferation of nuclear weapons and nuclear security. IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    Lodding, Jan; Kinley, David III

    2002-09-01

    One of the most urgent challenges facing the International Atomic Energy Agency (IAEA) is to strengthen the Agency's safeguards system for verification in order to increase the likelihood of detecting any clandestine nuclear weapons programme in breach of international obligations. The IAEA should be able to provide credible assurance not only about declared nuclear material in a State but also about the absence of undeclared material and activities. Realising the full potential of the strengthened system will require that all States bring into force their relevant safeguards agreements, as well as additional protocols thereto. Today, 45 years after the Agency's foundation, its verification mission is as relevant as ever. This is illustrated by the special challenges encountered with regard to verification in Iraq and North Korea in the past decade. Moreover, the horrifying events of 11 September 2001 demonstrated all too well the urgent need to strengthen worldwide control of nuclear and other radioactive material. The IAEA will continue to assist States in their efforts to counter the spread of nuclear weapons and to prevent, detect and respond to illegal uses of nuclear and radioactive material. Adherence by as many States as possible to the strengthened safeguards system is a crucial component in this endeavour

  14. The role of trade agreements in regional and subregional integration in the caribbean

    OpenAIRE

    Serrano Caballero, Enriqueta

    2016-01-01

    Esta comunicación tiene como objetivo analizar el papel de los acuerdos comerciales que han firmado la Comunidad del Caribe (en adelante CARICOM) y la Organización de Estados del Caribe Oriental (en adelante OECO), y ver si han influido en el fortalecimiento y en la reconfiguración de los procesos de integración regional y subregional en el Caribe. This communication aims to analyze the role that trade agreements it has signed the Caribbean Community (CARICOM) and the Organisation of Easte...

  15. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    Science.gov (United States)

    2007-12-14

    by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and

  16. The text of the third agreement to extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of agreement

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members. Pursuant to Article 1 of the Third Agreement to Extend the 1987 Regional Co-operative Agreement, the 1987 RCA shall continue in force for a further period of five years with effect from 12 June 2002, i.e., through 11 June 2007. As of 15 May 2002, notifications of acceptance had been received by the Director General from the Governments of Bangladesh, China, India, Indonesia, Republic of Korea, Malaysia, Pakistan, Sri Lanka and Viet Nam. The latest status list is attached

  17. The Korean Peninsula Energy Development Organization : implications for Northeast Asian regional security co-operation?

    International Nuclear Information System (INIS)

    Snyder, S.

    2000-01-01

    This paper identifies opportunities for co-operation on regional development and security in the North Pacific region. The Korean Peninsula Energy Development Organization (KEDO) was created in 1993 during bilateral negotiations between the United States and the Democratic People's Republic of Korea (US-DPRK) over North Korea's alleged nuclear weapons program. The negotiations resulted in an agreement to freeze North Korea's known nuclear weapons program in return for the construction of two proliferation-resistant 100 MWe light water reactors (LWR) in North Korea, and the provision of 500,000 tons of heavy fuel oil per year until the completion of the LWR construction as compensation for lost energy production capacity resulting from the shutting down of North Korea's nuclear reactors. The author described the activities of KEDO and examined its internal dynamics. The unique circumstances that produced the Agreed Framework and KEDO in response to a major international crisis of the nuclear program in the DPRK were also highlighted along with the US-DPRK bilateral agreement and the multilateral institution involving the United States, South Korea, Japan and the European Union. Financial support from Australia and Canada was discussed along with the mechanism for engaging North Korea in regularized interaction and technical cooperation. It was concluded that KEDO's record of successes and failures is mixed. The energy security issue has been identified as an area that could result in conflict among Northeast Asian countries which are increasingly dependent on oil supplies from the Middle East. In response, numerous multilateral financing mechanisms have been developed to promote joint business opportunities that exploit natural gas resources in the Russian Far East to address Japanese, Korean and Chinese energy needs. 35 refs

  18. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  19. An empirical application of regional security complex theory on eastern partnership region

    Directory of Open Access Journals (Sweden)

    Ludmila STUPARU

    2015-12-01

    Full Text Available Eastern Partnership (EaP is a very dynamic region. If a year ago the EaP was seen as an authentic and vibrant „laboratory” of democracy building, overcoming the remains of the totalitarian state and putting the basis of a free and pluralist society, nowadays the Eastern Partnership is seen as an „out-dated” approach of the EU. However, Eastern Partnership is visible on European political arena and the big powers (USA, Russia and the EU pay attention more and more to the evolution of EaP countries. Moreover, it seems to be a confrontation between Russia and Western powers regarding the political and geopolitical orientation of EaP countries. Kremlin tries actively to stop the efforts of the EaP to close to the EU and on the other side, the EU as well as the USA encourage EaP countries to implement reforms in order to build their democracy. This paper aims to analyse the Eastern Partnership in terms of security complex, trying to argue that Eastern Partnership countries at this phase don’t form a Regional Security Complex and the EU and USA should rethink its approach towards this region.

  20. Agreement Workflow Tool (AWT)

    Data.gov (United States)

    Social Security Administration — The Agreement Workflow Tool (AWT) is a role-based Intranet application used for processing SSA's Reimbursable Agreements according to SSA's standards. AWT provides...

  1. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1962-10-18

    On 14 September 1962 the Board of Governors approved an Agreement for the establishment in Cairo of a Middle Eastern regional radioisotope centre for the Arab countries. The text of this Agreement is reproduced in this document for the information of all Members.

  2. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries

    International Nuclear Information System (INIS)

    1962-01-01

    On 14 September 1962 the Board of Governors approved an Agreement for the establishment in Cairo of a Middle Eastern regional radioisotope centre for the Arab countries. The text of this Agreement is reproduced in this document for the information of all Members

  3. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  4. The IPA and the American Psychoanalytic Association: a perspective on the regional association agreement.

    Science.gov (United States)

    Wallerstein, R S

    1998-06-01

    Ever since 1938 the American Psychoanalytic Association has had a special autonomous relationship within the IPA accorded to no other component organisation. This Regional Association status has had two main features: (1) total internal control over training standards and membership criteria, with no accountability to the IPA; and (2) an 'exclusive franchise', so that the IPA was barred from recognising any other component within the United States. This unique Regional Association status reflected the resolution at the time (1938) of the long-standing controversy between the IPA and the American over the issue of 'lay analysis', and remained unaltered for half a century until, with the resolution of the 3 1/2-year long law-suit against the American (and secondarily against the IPA) in 1988, the Regional Association agreement was modified (but not totally abrogated) by the American's giving up the 'exclusive franchise' aspect (thus permitting IPA recognition of psychoanalytic groups in the US organised outside the American), but still retaining its internal full control over training and membership. The meanings and consequences for psychoanalysis of this special status of the American are explored.

  5. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  6. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Uren, R.T.

    1992-01-01

    The subject of regional security and arms control in the South-East Asia raises some new and difficult issues. No approach to ensuring regional security could be complete without military dimension including the following categories: regional arms control; global arms control measure; confidence building measures that are designed to enhance the transparency of defense policies; confidence building measures that encourage cooperation among the military forces in the region

  7. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  8. Implications of the New Regional Trade Agreements for the World Trading System

    Directory of Open Access Journals (Sweden)

    Agnes Ghibuțiu

    2017-04-01

    Full Text Available The year 2013 witnessed an outstanding rise in the pace and scale of negotiations on regional trade agreements (RTAs. While RTAs are not a new phenomenon, current negotiations involve multiple parties and/or major trading countries that have a significant combined economic weight, i.e. mega-RTAs. This paper looks at the recent surge in trade regionalism and addresses some of the key issues related to the potential impact of mega-RTAs upon the world trading system and global trade patterns. It examines the peculiarities of the new mega-RTAs and the factors underlying their proliferation, and discusses the main concerns raised by their foreseeable impact on excluded countries and the wider trading system. The paper finds that, if successfully concluded, mega-RTAs are likely to have far-reaching implications for the world trading regime, affecting its transparency and coherence. Nevertheless, the adverse effects could be cushioned through a revival of trading nations’ interest in the multilateral Doha Round talks.

  9. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1969-01-01

    The text of the Agency's agreement for co-operation with the Organization of African Unity (OAU) is reproduced in this document for the information of all Members. The agreement entered into force on 26 March 1969

  10. The text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987. Status of acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    The document gives the status of acceptances as of 28 February 1993 of the agreement to extend regional co-operative agreement for research, development and training related to nuclear science and technology from 1987

  11. Air pollution reduction and control in south asia need for a regional agreement

    International Nuclear Information System (INIS)

    Khwaja, M.A.; Shaheen, N.; Sherazi, A.; Shaheen, F.H.

    2012-01-01

    With increasing urbanization and economic growth, air pollution is becoming an urgent concern in South Asia. The objective of this study is to look into and discuss the socioeconomic situation of South Asia, the existing situation of air pollution in the countries of the region, resulting health impacts of air pollution on the population and the responses, if any, of national governments to combat this problem. With the increase in industrial activity and exponential growth in number of vehicles and population, the contribution of each South Asian country to the regional air pollution will increase over time. As evident from the review of the available country data, sulfur dioxides, nitrogen oxides and particulate matter (PM) emissions have been rising steadily over past few decades. The air pollutants can be transported across state and national boundaries, therefore, pollutants produced by one country can, as well, have adverse impacts on the environment and public health of neighboring countries. It has been reported by the country national health authorities that air pollution has pushed respiratory diseases up in the ranks as the leading cause of hospitalization. To minimize the socio-economic and health impacts, resulting from air pollution, South Asian states have developed environmental legal and regulatory frameworks in their respective countries. However, the implementation of country national environmental action plan has been limited due to lack of financial resources and technical know-how. Recommendations have been made for policy actions, including a legally binding agreement for South Asia (LBA-SA), for strengthening the framework for air pollution reduction at regional and national levels in South Asia. (author)

  12. Korea’s Trade Strategies for Mega Free Trade Agreements in Regional and Global Economic Integration

    Directory of Open Access Journals (Sweden)

    Sang-Chul Park

    2016-12-01

    Full Text Available Korea has developed rapidly since the 1960s. It is one of the four Asian tiger economies and a good model for developing countries. Korea shows the world how a developing country can develop its economy rapidly and become industrialized. Its development strategy has mainly been an export-oriented trade policy. As a result, its trade volume grew from $1 billion in 1966 to $1 trillion in 2011, which is a 1,000-fold increase within five decades. Since 2011, Korea has become one of seven countries with a trade volume over $1 trillion. However, the Korean economy has experienced turbulence as well as positive growth. It underwent severe economic crises such as the Asian financial crisis in 1997 and the global financial crisis in 2008. Its economy has been extremely vulnerable to the external economic environment, although it has improved and strengthened, particularly since the global financial crisis. During those two crises, the government carried out an appropriate trade policy with a strategic approach to upgrade its industrial structure and competitiveness in global markets. This article comprehensively discusses Korean trade policy and strategy over the last five decades, and how its national economy has developed rapidly. It also explores how the government sets its strategic targets in Asia and the Asia Pacific region. It considers two mega free trade agreements (FTAs — the Regional Comprehensive Economic Partnership and the Trans-Pacific Partnership — as new opportunities for further development. Therefore, it is wise to analyze these regional mega FTAs in order to maximize the national interest.

  13. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations; Teksty Soglashenij o Sotrudnichestve Mezhdu Agentstvom i Regional 'Nymi Mezhpravitel' Stvennymi Organizacijami

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [Russian] Teksty soglashenii Agentstva o sotrudnichestve s perechislennymi nizhe regional'nymi mezhpravitel'stvennymi organizacijami vmeste s sootvetstvujushhimi protokolami, udostoverjajushhimi ih autentichnost'; soglashenija perechisleny v porjadke vstuplenija ih v silu.

  14. Law 18.871. It approve the Security Energetic agreement between the Republic of Uruguay and the Bolivarian Republic of Venezuela

    International Nuclear Information System (INIS)

    2012-01-01

    The proposal of this law is the agreement between Venezuela and Uruguay about the implementation of the energy security legislation . Both countries are committed to have a binational structure in this follows areas: oil, gas, refining, petrochemicals, transport, storage, electricity, alternative energy and marine transport

  15. Evaluation the Role of Securities Market in Increasing the Regional Budget Revenues

    Directory of Open Access Journals (Sweden)

    Aleksandr Yemelyanovich Miller

    2015-09-01

    Full Text Available In the article, the relevant problem of increasing the regional budget revenues is investigated. The subject matter of the research is the securities market as a mechanism for the redistribution of financial resources. The purpose of the research is justification of the effective scheme feasible in the current environment of the interaction of the securities market and the regional budget. In the study of the above-mentioned subject, the hypothesis of a close relationship between state and non-state finance system was taken as a basis. The theoretical principle of the research supports the theory of the stock market; to achieve the purpose, the institutionally-functional approach to the study of state finances is applied. As the result of the research, possible common grounds of the securities market and the regional financial system are identified; the reserve of improving efficiency of the securities market in the Western Siberia regions are revealed; the model reflecting the dependence of tax revenues from the pace of regional economic development is constructed; promising areas for development of the securities market for the benefit of the regional economy and regional financial system are formulated; the possible effect from the development of regional securities market on regional budget revenues is estimated. The results mentioned above are recommended to be apllied when developing regional financial policies and programmes of region socio-economic development. A long-term stimulation of the growth in incomes of regional budgets is a very complex process, but with the proper elaboration of organizational issues, the implementation of the proposed scheme for interaction of the securities market and the regional financial system is capable to provide a steady increase in tax revenue in the short term and alleviate the problem of financing costs of the regional budget.

  16. Free Trade Regional Agreements and Human Rights: the case of TPP and its impact in Chile

    Directory of Open Access Journals (Sweden)

    Juan Carlos Lara

    2016-08-01

    Full Text Available The negotiation and signature of free trade agreements has been a policy implemented by governments of many countries with economies open to international trade. Chile has been part of that trend, with a recent example in the signature of the Trans-Pacific Partnership Agreement. However, the content of such agreements is not exclusively related to conditions of trade between countries. In fact, this kind of agreement include progressively normative content of local nature, which are discussed and negotiated under much different conditions that local law or agreements signed in international forums. This implies consequences not only in the content of fundamental rights affected by the rules set in the agreements, but also in the shape that such rights are recognised and configured by democratic States.

  17. Exploring stories of occupational engagement in a regional secure unit.

    Science.gov (United States)

    Morris, Karen; Cox, Diane L; Ward, Kath

    2016-09-02

    This paper focuses on the occupational experiences of five men living within a forensic mental health unit over a year. This study used a descriptive qualitative case study methodology to explore the meaning and value placed on daily life (activities, occupations and routines), and how this changed over time. The men's stories showed a complex picture of their experiences of daily life. This study demonstrated the impact of the environment on the men and the ongoing challenge of the need to balance treatment/therapy with security demands and opportunities. Three interrelated themes were identified: (1) Power and Occupation; (2) Therapy or Punishment; (3) Occupational Opportunities within Restrictions. These findings serve as a reminder to clinical teams to reassess the value of occupations attributed by their patients and the impact of the secure environment, whilst also acknowledging the potential for occupations to have a negative impact on well-being.

  18. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  19. 75 FR 27432 - Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2010-05-17

    ... can better evaluate its effects on them and participate in the rulemaking process. Small businesses... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0221] RIN 1625-AA87 Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA AGENCY...

  20. Nuclear power in Northern Russia: A case study on future energy security in the Murmansk region

    International Nuclear Information System (INIS)

    Kinnunen, Miia; Korppoo, Anna

    2007-01-01

    The economy of the Murmansk region in Russia is based on energy intensive industry, mainly metallurgies, and consequently, the region is highly dependant on the ageing Kola nuclear power plant. This interdependence together with other weaknesses in the regional energy system creates threats to the energy supply security of the region. This paper analyses the internal and external threats influencing the region and presents potential solutions. Scenarios further illustrate possible future paths these potential solutions could deliver by the year 2025

  1. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  2. Guidelines and recommendations for regional approaches to disarmament within the context of global security

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Guidelines and recommendations for regional approaches to disarmament within the context of global security provide both a conceptual framework within which to pursue arms control in South Asia and a variety of concrete mechanisms or tools to carry out the task. However, they cannot operate independently of a broader process of political accommodation, which might be named as 'cooperative security building'. That process, however embryonic, is under way across Asia Pacific region

  3. Security: The Fourth Pillar of the Caribbean Community. Does the Region Need a Security Organ

    Science.gov (United States)

    2016-06-10

    in national emergencies, search and rescue, immigration control, fisheries protection, customs and excise control maritime policing duties, natural...Committees as follows: (1) Commissioners of Police; (2) Chiefs of the Military; (3) Chiefs of Immigration ; (4) Comptrollers of Customs; and (5) Heads...Territorial Issue” (Master’s thesis, University of Chile , 1995). 52 CARICOM IMPACS, “CARICOM Crime and Security Strategy of 2013,” February 2013, accessed

  4. Eastern Canadian crude oil supply and its implications for regional energy security

    International Nuclear Information System (INIS)

    Hughes, Larry

    2010-01-01

    Canada has been blessed with immense energy resources; however, their distribution is not uniform. One such example is crude oil, which is found primarily in western Canada. Eastern Canada, consisting of the six eastern-most provinces (Newfoundland and Labrador, New Brunswick, Nova Scotia, Ontario, Prince Edward Island, and Quebec), produce limited quantities of crude oil, most of which is exported to the United States. Ideally, western Canadian crude oil would meet the demands of eastern Canada; however, the North American Free Trade Agreement (NAFTA) and the absence of oil pipelines means that eastern Canada increasingly relies on supplies of crude oil from a small number of oil exporting countries, many with declining production. This paper examines crude oil production, supply, and its refining in eastern Canada. It shows that crude production in the region has reached its peak and that increasing global competition for crude oil will affect energy security in eastern Canada, either through price increases or supply shortages, or both. (author)

  5. Basic Practices Aiding High-Performance Homeland Security Regional Partnerships

    National Research Council Canada - National Science Library

    Caudle, Sharon

    2006-01-01

    ....1 A national priority under the Goal is the use of geographic regions across the nation to share risk, engage in joint planning, and share resources to develop and sustain risk-based capability levels...

  6. China in West Africa's Regional Development and Security Plans1

    African Journals Online (AJOL)

    Abstract. This article argues that we are presently in another global economic transition. ... business opportunities in areas such as the construction of infrastructure .... towards the West and regional economies are poorly integrated. Today,.

  7. Homeland Security: Protecting Airspace in the National Capital Region

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... While the administration is currently seeking to make the airspace restrictions in the National Capital Region permanent, Congress has pushed for an easing of restrictions on GA aircraft at Ronald...

  8. Prospects of Collective Security in the Eastern Africa Region

    Science.gov (United States)

    2013-06-14

    Union EAC East African Community EAR Eastern Africa Region EASBRIG East African Standby Brigade EASF Eastern Africa Standby Force ECOMOG ECOWAS...address inherent social, economic and political problems while at the same time facing the world economy as one block (AU 2000). The Union is a...the East African Community ( EAC ) will go on smoothly and its success will continue to attract other regional states to join thereby expanding the

  9. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  10. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  11. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  12. Harmonization of domestic legislation in the field of civil law with the European Union law: Securing of claims by means of fiduciary agreements

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan

    2012-01-01

    Full Text Available This paper analyses fiduciary agreements, which, as a form of contract, that is the means of securing obligation and legal claims, are regulated by provisions of specific laws and codifications in some of the European Union countries. Even the Montenegrin legislator enacted a special law governing these legal matters, however in the Serbian law fiduciary agreements fall into the category of innominate contracts. Fiducia originates in the Roman Law and constitutes the first common form of the pledge law. The Latin term fiducia means 'trust', since these legal matters were, first of all, based on the trust between contractual parties. This paper addresses the institution of 'trust' as it is the Anglo-Saxon counterpart of the fiduciary agreement. Etymologically, 'trust' has the same meaning as the term fiducia - trust. Due to their advantages, fiduciary agreements are not even uncommon in the domestic legal practice, while there are certain, as we have already announced, theoretical, but also practical concerns arguing admissibility of this legal matter. These arguments mainly come down to the thesis (mentioned above that entering into the fiduciary agreement results in violation of the ban on performance of contract lex commissoria in the pledge law. Nevertheless, I provided explanation that differences between contracts of pledge and fiduciary agreements clearly point to the conclusion that fiduciary agreements may not be treated as a pledge, hence they are admissible, that is, they are concluded on the principle of contractual freedom as an imperative norm of the Law on Obligations. Fiduciary agreements (in relation to the realistic means of security offer to the creditor a higher level of security, reduce the period of payment of his claims, also providing practical benefits for the debtor himself. The paper presents the reasons supporting the view that it would be advantageous for the Serbian legislator, in the process of harmonization of the

  13. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  14. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  15. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  16. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  17. Rise of China in the Caribbean: Impacts for Regional Security

    Science.gov (United States)

    2013-12-13

    Prima facie , more demonstrative of a policy is to retain primacy in the region while engaging the interests and cooperation of Caribbean states. In...and diplomatic cooperation with Caribbean nations. The prima facie implications are therefore, without evidence to the contrary, that these

  18. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  19. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  20. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  1. The influence of ecological and economic security on region's investment appeal

    OpenAIRE

    Aleksandr Kuklin; Irina Belik

    2009-01-01

    In the article authors reveal regional aspect of the problem of influence the ecological factor on investment appeal. This allows considering from the point of ecological and economic security. The choice of the type of investment policy in different scenarios of social-economic development of the region.

  2. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  3. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2014-03-01

    Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.

  4. Table of written agreements on securing safety of nuclear power plants (Saga, Shimane, Fukushima, Ehime, Miyagi, Ibaraki, Fukui and Shizuoka prefectures)

    International Nuclear Information System (INIS)

    1981-01-01

    A table collecting the written agreements concluded between local city, town and village offices, prefectural governments and the local nuclear enterprises on securing nuclear power safety is given, which was prepared by the study committee on local development and finance problems in Japan Atomic Industrial Forum, Inc. The prefectures, with each of which the agreement was concluded are Saga, Shimane, Fukushima, Ehime, Miyagi, Ibaraki, Fukui and Shizuoka. The local nuclear enterprises are Kyushu, Chugoku, Tokyo, Shikoku, Tohoku, Chubu and Kansai Electric Power Companies, Japan Atomic Power Company, Japan Atomic Energy Research Institute, Power Reactor and Nuclear Fuel Development Corporation, etc. The contents of the agreements are as follows: radioactive waste and material control, understanding in advance of plans, environmental radioactivity measurement, presentation of measured results, hazard countermeasures, communication in normal plant operation and others, on the spot inspection, damage compensation, etc. (J.P.N.)

  5. Security trends in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Qian Jiadong

    1992-01-01

    The drastic world changes are less conspicuous in Asia-Pacific region than in it was the case in Europe, although they must be considered as stabilizing factors as well as sustained economic dynamism. Due to these changes some progress was achieved in world disarmament and arms control. But this is considered only a first step, there remains a long way to go. In the case of Asia-Pacific, possessors of largest nuclear arsenals and most sophisticated conventional arms need to further reduce their forces, support the proposals of setting up nuclear-weapon-free zones and commit themselves to no-first-use of nuclear weapons and non-use of nuclear weapons against non-nuclear states. Their fulfilment of these demands would undoubtedly contribute towards the prevention of a new round of the arms race and to the non-proliferation of weapons of mass destruction in Asia-Pacific region

  6. Ethnic Separatism in Pakistan as a Threat to Regional Security

    OpenAIRE

    Adam Isaevich Khahkhanov

    2015-01-01

    At present ethnic separatism is shown in various regions practically on all continents and it is the same serious call of the international stability and safety, as religious extremism and drugs. Ethnic separatism is shown and in the Southern Asia, particularly, in India, Pakistan, Sri - Lanka, leading to terrorism acts and a numerous death. The author analyzes sources and the reasons of ethnic separatism in Pakistan. Author marks that the basis for statehood of Pakistan while independence de...

  7. Text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1994-01-01

    As of 1 September 1994, notifications of acceptance of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), in accordance with Article XIII thereof, had been received by the Director General from the Governments of: Tunisia, Egypt, Algeria, Nigeria, Madagascar, Libya, Morocco, Kenya, Sudan, Ghana, Tanzania, Mauritius, Cameroon, South Africa, Zaire, Ethiopia, Zambia, Niger. The Agreement entered into force on 4 April 1990, the date of receipt of the third notification of acceptance

  8. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations. The Agreement with the League of Arab States

    International Nuclear Information System (INIS)

    1972-01-01

    The text of the Agency's agreement for co-operation with the League of Arab States is reproduced in this document for the information of all Members. The agreement entered into force on 15 December 1971 pursuant to Article IX

  9. Managing Regional Collaboration in Higher Education: The Case of the North American Free Trade Agreement (NAFTA).

    Science.gov (United States)

    Crespo, Manuel

    2000-01-01

    Describes accomplishments in increasing collaboration in higher education within the North American Free Trade Agreement (NAFTA). Analyzes procedures for determining equivalencies of courses and degrees and for improving transnational mobility of students and professors. Also discusses the role of the private sector in research, education and…

  10. The Need for a Regional Security System Multinational Coast Guard Unit in the Eastern Caribbean

    Science.gov (United States)

    2012-06-08

    the teaching staff of Staff Group 11 A (Mr Matt Bonnott, Dr Thomas Huber, LTC Andrew McIntyre) and Mr William Knight for officiating, my oral...assist me on this journey. Finally, to my wife Vonette, son Isaiah , daughter Makayla, my mother Muriel (this one is for you), and my friends (too...for the implementation of a new security risk management mechanism to enhance the security of the RSS sub-region. According to Thomas Norman in the

  11. Experience with WASP and MAED among IAEA Member States participating in the Regional Co-operative Agreement (RCA) in Asia and the Pacific Region

    International Nuclear Information System (INIS)

    1989-10-01

    The report includes the proceedings and papers presented during the workshop on the experience with WASP/MAED computer programs among IAEA Member States participating in the regional co-operative agreement (RCA) in Asia and the Pacific Region, organized by the IAEA and held in Kuala Lumpur (Malaysia) between 5-9 December 1988. A separate abstract was prepared for each of the 14 papers presented. Refs, figs and tabs

  12. Ethnic Separatism in Pakistan as a Threat to Regional Security

    Directory of Open Access Journals (Sweden)

    Adam Isaevich Khahkhanov

    2015-12-01

    Full Text Available At present ethnic separatism is shown in various regions practically on all continents and it is the same serious call of the international stability and safety, as religious extremism and drugs. Ethnic separatism is shown and in the Southern Asia, particularly, in India, Pakistan, Sri - Lanka, leading to terrorism acts and a numerous death. The author analyzes sources and the reasons of ethnic separatism in Pakistan. Author marks that the basis for statehood of Pakistan while independence declaration was not ethnic, but cultural and religious factors, which already contained potential separatism. Article tells us about modern manifestation of ethnic separatism in Pakistan. In particular, the author describes sources, the reasons and manifestations of separatism of Pushtuns and Beludzhy. According to the author, separatism of Beludzhy and Pushtuns is the specific danger not only to integrity of Pakistan. This can lead in the long term to disintegration of the state that is fraught with serious consequences for stability and safety not only for the Southern Asia, but also for other regions nearby Russia.

  13. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...

  14. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  15. Agreement Between Cytology and Histopathology for Regional Lymph Node Metastasis in Dogs With Melanocytic Neoplasms.

    Science.gov (United States)

    Grimes, Janet A; Matz, Brad M; Christopherson, Pete W; Koehler, Jey W; Cappelle, Kelsey K; Hlusko, Katelyn C; Smith, Annette

    2017-07-01

    Melanocytic neoplasms are common in dogs and frequently occur within the oral cavity or in haired skin. The behavior of melanocytic neoplasms is variable and depends on tumor location, size, and histopathologic features. This study compared cytopathology and histopathology of 32 lymph nodes from 27 dogs diagnosed with melanocytic neoplasms. Agreement between the original cytology report, cytology slide review, original histopathology report, and histopathology slide review was determined for each lymph node. A subset of lymph nodes was subjected to immunohistochemistry (Melan-A) and additional histochemical stains/techniques (Prussian blue, bleach) to assist in differentiation of melanocytes and melanophages. Agreement ranged from slight to fair for each of the variables evaluated with weighted kappa (κ w ) or kappa (κ) analysis (original cytology vs cytology review κ w = 0.24; original cytology vs original histopathology κ w = 0.007; original cytology vs histopathology review κ w = 0.23; cytology review vs original histopathology κ w = 0.008; cytology review vs histopathology review κ w = 0.006; and original histopathology vs histopathology review κ = 0.18). The diagnoses (metastatic, equivocal, or negative for metastasis) of the original report and slide review for both cytology and histopathology were not significantly correlated with survival in this population of patients. Overall, agreement between cytology and histopathology was poor even with a single clinical or anatomic pathologist performing slide review. Consensus between routine cytology and histopathology for staging of lymph nodes in patients with melanocytic neoplasms is poor and does not correlate with survival.

  16. The management of the state reserving system in the aspect of the regional economic security supporting

    Directory of Open Access Journals (Sweden)

    Aleksandr Yefimovich Zemskov

    2011-06-01

    Full Text Available This paper reviews the role of the state material reserve system to ensure economic security of the region. A classification of reserves ensuring economic security of the region was elaborated. A scheme of systematic and structural representation of the state material reserve in order to improve the economic security of the region was suggested. Optimization of operational control of the territorial offices, factories, and settlements of custody within the framework of the state material reserve is one of the most effective instruments to enhance the functioning of the whole system. To solve the problem of technological processes optimization of products acquisition and storage in manufacturings, plants and points of consignment storage of the state material reserve, a static economic-mathematical model was developed. The results can be used to develop appropriate computer systems for support of effective management decisions in the system of state of material reserve.

  17. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  18. Comparison of the Efficiency of Budget Financing and the Social Security of a Region

    Directory of Open Access Journals (Sweden)

    Aleksandr Anatolyevich Kuklin

    2016-09-01

    Full Text Available In the article, the theoretical and economic aspects of the category “security” are considered, the distinction between philosophical and socio-economic approaches to the understanding of social security is drawn. From the point of view of the system approach, the place of social security for national security protection is determined. The theoretical content of the category “social security” is shown; in the authors’ treatment, the specifying concepts such as “social risks”, “danger”, “threat” are given. For the purpose of risks identification (deviations and the revealing of the factors of inefficient financing, the methodological tools for the assessment of the social security of a region are proposed. These tools are based on the integrated assessment of the regional socio-economic indexes and the indexes assessing the budgetary financing of the territory. The methodical approach offered by the authors is based on the detection of dependencies between the social and financial security of a region. As estimates, the indicators reflecting the level of social security in the territory of residence are chosen: income, expenses of the consolidated budget of a region, growth rate of gross regional product, rate of natural population growth, level of unemployment, population share with the income below living level. This approach is approved on the example of Perm Krai and Sverdlovsk region; the regularities, the favourable and adverse periods for social security of the region are revealed. The received estimates are ranged depending on a temporary log of growth (fall, elasticity and sensitivity to the budget financing. The results of the assessment have shown that, from the point of view of social security protection, Perm Krai has entered a stage of deep recession, which started in 2012. Similar tendencies are observed in the Sverdlovsk region. Nevertheless, considering both a visible variety and the dominating influence of

  19. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  20. Algorithm and Indicators of Evaluation of Agrarian Policy Efficiency in the Sphere of Food Security of the Region

    Directory of Open Access Journals (Sweden)

    Elena Nikolaevna Antamoshkina

    2015-12-01

    Full Text Available The article substantiates the author’s method of analysis of the regional food security and its approbation on the example of the Southern Federal District. The author’s goal was to develop a comprehensive universal method of analysis of the regional food security. To achieve this goal the following steps were required: to develop a system of indicators to measure food security at the regional level; to define criteria for assessing regional food security; to synthesize model analysis and evaluation of food security in the region. The paper presents an algorithm for the phased application of methodology for assessing regional food security. The recommended indicators and criteria for assessing regional food security are consistent with the parameters defined by the Doctrine of food security in Russia, and take into account the requirements of the WTO. The proposed method was tested on data from the largest regions of the Southern Federal District, which allowed a comparison of the level of food security in the regions of the spatial and temporal perspective. Comparison was made on the basis of an integrated assessment of the level of food security in the regions. The theoretical significance consists in the meaningful complement to research models and tools for analysis of food security at the regional level of the economy in terms of justification of indicators and criteria for assessing food security in the region in terms of Russia’s participation in the WTO. The practical significance is in developing and testing the proposed method based on an assessment of indicators of food security in SFD.

  1. Inter-rater agreement of the PEWS tools used in Central Denmark Region

    DEFF Research Database (Denmark)

    Jensen, Claus Sixtus; Aagaard, Hanne; Olesen, Hanne Vebert

    2017-01-01

    BACKGROUND: Paediatric early warning score (PEWS) assessment tools can assist healthcare providers in the timely detection and recognition of subtle patient condition changes signalling clinical deterioration. However, PEWS tools instrument data are only as reliable and accurate as the caregivers...... agreement. The nurses assigned the exact same aggregated score for both PEWS models in 76% of the cases. In 98% of the PEWS assessments, the aggregated PEWS scores assigned by the nurses were equal to or below 1 point in both models. CONCLUSION: The study showed good to very good inter-rater reliability...

  2. The Text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology, 1987. Status of Acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    As of 28 February 1993, notifications of acceptance of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (See INFCIRC/ 167/Add.15), in accordance with Article 2 thereof, had been received by the Director General from the Governments [ru

  3. The Text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology, 1987. Status of Acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    As of 28 February 1993, notifications of acceptance of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (See INFCIRC/ 167/Add.15), in accordance with Article 2 thereof, had been received by the Director General from the Governments [es

  4. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  5. The text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques

    International Nuclear Information System (INIS)

    1987-04-01

    The full text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques between the Agency and Member States is reproduced. The Agreement entered into force on 20 May 1986 after the Governments of Japan, Bangladesh and the Philippines had notified the Agency of their acceptance of the Agreement

  6. Technical cooperation for the pacific uses of nuclear technology in Latin America and Caribbean: the experience of regional agreement ARCAL

    International Nuclear Information System (INIS)

    Rondinelli Junior, Francisco

    2017-01-01

    This thesis studies the international technical cooperation in the field of peaceful applications of the nuclear technology, focusing on the experience of Latin American countries, where the Cooperation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean, also known as ARCAL, is in force. The study adopts as theoretical approach the concept of state capacities, particularly with regard to the institutional capacities applicable to the ARCAL Agreement. Within this approach, three dimensions of analysis are adopted: the institutional dimension, the governance dimension and the focus on outcomes. The evaluation of the ARCAL Agreement is carried out in order to confirm if the intended role to promote regional technical cooperation in the nuclear sector is being implemented. The methodological approach adopted the case study model. It starts with the analysis of the institutional evolution of the Agreement, and identifies variables articulating with the three dimensions above mentioned. The empirical data were collected in two stages. In the first stage it were performed 29 interviews carried out by the author with the technical and staff members of the Department of Technical Cooperation of IAEA, in Vienna, Austria, headquarter of IAEA. The other stage involved an electronic questionnaire submitted to the national coordinator of ARCAL in 14 countries, in a universe of 21 member states. The conclusion of the research points to the fact that the ARCAL Agreement has incorporated, throughout its trajectory, elements of the institutional capacities which are still in the process of development. They give to the Agreement the potential to induce the development of the state capacities of the respective countries in the field of peaceful applications of nuclear technology. (author)

  7. SECTOR-SPECIFIC STRUCTURE OF THE REGIONAL ECONOMY AS A FACTOR OF ELEVATION OF RISKS TO ITS ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Rostislav BILYK

    2016-07-01

    Full Text Available The article analyzes a sector-specific specialization of the regional economy in Ukraine. It also reveals possibility and conditions of transformation of a sector-specific specialization of the region and risks to its economic security. The article suggests an assessment of influence of a sector-specific specialization on occurrence of threats to the economic security of the region.

  8. Investigating the Influence of Regional Stress on Fault and Fracture Permeability at Pahute Mesa, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Donald M. [Desert Research Inst. (DRI), Reno, NV (United States); Smith, Kenneth D. [Univ. of Nevada, Reno, NV (United States); Parashar, Rishi [Desert Research Inst. (DRI), Reno, NV (United States); Collins, Cheryl [Desert Research Inst. (DRI), Las Vegas, NV (United States); Heintz, Kevin M. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-05-24

    Regional stress may exert considerable control on the permeability and hydraulic function (i.e., barrier to and/or conduit for fluid flow) of faults and fractures at Pahute Mesa, Nevada National Security Site (NNSS). In-situ measurements of the stress field are sparse in this area, and short period earthquake focal mechanisms are used to delineate principal horizontal stress orientations. Stress field inversion solutions to earthquake focal mechanisms indicate that Pahute Mesa is located within a transtensional faulting regime, represented by oblique slip on steeply dipping normal fault structures, with maximum horizontal stress ranging from N29°E to N63°E and average of N42°E. Average horizontal stress directions are in general agreement with large diameter borehole breakouts from Pahute Mesa analyzed in this study and with stress measurements from other locations on the NNSS.

  9. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations. The Agreement with the Agency for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    1972-01-01

    The text of the Agency's agreement for co-operation with the Agency for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The agreement entered into force on 3 October 1972 pursuant to Article VIII

  10. The Migration Crisis from the East-Central European Perspective: Challenges for Regional Security

    Directory of Open Access Journals (Sweden)

    Renata Podgórzańska

    2017-12-01

    Full Text Available Nowadays, the common denominator of involvement of the EastCentral Europe in the international arena, and above all, the premise determining community of interest expressed in the European Union is the migration crisis. Despite the different circumstances of activity in the context of the migration crisis, states in the region express similar opinions on the consequences of immigration for security in the region. Above all, they emphasise the implications of immigration for the internal security of states. Given the complex nature of migration, this article focuses on the phenomenon of immigration in the EU, determining the causes of the escalation of the influx of immigrants and, above all, identifying the consequences for the security of states of East-Central Europe.

  11. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  12. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq

    NARCIS (Netherlands)

    Shukor, Ali R.; Klazinga, Niek S.; Kringos, Dionne S.

    2017-01-01

    Background: This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and

  13. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  14. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  15. Globalisation, States, and Regionalisation: Analysing post-Cold War Security in the Mediterranean Region

    NARCIS (Netherlands)

    Amineh, M.P.; Grin, J.; Brauch, H.G.; Liotta, P.H.; Marquina, A.; Rogers, P.; Selim, M.E.-S.

    2003-01-01

    Is it possible to promote security in the Mediterranean through a process of increasing regional cooperation that builds upon the commonality in problems and opportunities more than on the mutual divides? In a comprehensive and enlightening analysis, Brauch (2001) has argued that this option is

  16. Military-political Processes in the Caucasus Region and the Security of Russia

    Directory of Open Access Journals (Sweden)

    Anna V. Vilovatykh

    2015-01-01

    Full Text Available The unipolar world breaking and the tightening of geopolitical struggle led to destructive military-political processes in different regions of the world. In conditions of instability along the perimeter of Russia's borders the significance of the Caucasus region increases, especially in geo-strategic and geoeconomic perspectives. The efforts of world politics actors for the transformation of the region environment increase substantially. As a result the dynamics and the scope of the proceeding military-political processes in the Caucasus are complicated. The failures in the assessment and the prediction of the processes development influence on the safety of Russia. Wrong gradation of existing threats and challenges can lead to disastrous and irreversible consequences for state security. Designated circumstances caused the need for the expert survey on assessing the impact of the current military-political processes in the Caucasus region on the security of the Russian state and necessity for the concretization of military dangers and threats, due to political and military developments in the Caucasus. An expert survey was conducted in June 2014. During it authors interviewed 40 Russian and foreign experts representing Federal and regional authorities, academic community, research centers, analytical structures. Implementation of the survey allowed to identify the experts positions and the degree of their coherence on the military-political processes in the Caucasus region and their impact on the modern Russia security. As a result the degree of destructiveness of the regional military-political processes was fixed. We conclude that anti-Russian processes in the countries of the Caucasus continue to determine the overall geopolitical situation, including in the military-political sphere. The reason is mainly seen in interests clashing of Russia and countries of the "Atlantic world." Analysis of the military-political processes in the Caucasus

  17. East Asia’s energy needs: The impact on security and guidelines for regional governance

    Directory of Open Access Journals (Sweden)

    Pablo Pareja Alcaraz

    2010-04-01

    Full Text Available The last three decades have witnessed a spectacular (and not easily sustainable increase in the global demand for energy. This trend has a particular significance in East Asia owing to its heavy industrialisation, which is promoting intense regional growth, on top of the already delicate balance of security in the region and the traditional refusal by the region’s states to delegate power and management to supranational bodies. The aim of this article is to analyse the impact of East Asia’s energy needs on security and on the instruments of order and governance that have been developed in the region up until the present time. Thus, the article is divided into two parts; the first analyses East Asia’s energy programme and its most significant features: 1 a high dependence on oil imports from other regions, especially the Middle East; 2 a persistence of high dependency on pollutant fossil fuels; and 3 a high degree of energy insecurity. Meanwhile, the second part assesses the impact of energy on regional relations in different areas of security and guidelines for regional government: 1 the securitisation of energy and of the environment; 2 the reactivation of certain maritime conflicts; 3 the transformation of certain threats, and conventional and non-conventional challenges to regional security; 4 the rise of non-state actors (mainly environmental businesses and NGOs in East Asia’s international relations; 5 the maintaining of bilateralism and the promotion of multilateral initiatives; and 6 the emergence of new extra-regional geopolitical links and balances.

  18. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  19. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  20. Inter-regional transmission and power trading opportunities : making operating agreements work

    International Nuclear Information System (INIS)

    DesRosiers, D.

    2001-01-01

    International electric power transmission issues were the focus of this power point presentation which included a corporate profile of the Detroit Edison and International Transmission Company (ITC) and an overview of the midwest U.S. market and the Michigan-Ontario interconnections. ITC owns the transmission assets of its parent company Detroit Edison. It has a commitment with the Federal Energy Regulatory Commission (FERC) to be independent of all market participants within 18 months. ITC's peak load is 11,000 MW with 3 interconnections with Hydro One in Ontario, Consumers Energy in Michigan and First Energy in Ohio. The Ontario-Michigan interface includes four tie lines, 3 near Sarnia and 1 near Windsor, with a total capacity of 1,400 MW into Ontario and 2,000 MW out of Ontario. However, the amount of commercially available power is significantly inhibited by a phenomenon called loopflow, which is the difference between the scheduled and actual power flow. The problems and solutions to loopflow were also outlined. This presentation also briefly discussed the agreement reached between the Alliance RTO and the Midwest ISO that will allow the two to co-exist in the Midwest. tabs., figs

  1. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  2. Trade Facilitation Provisions in Regional Trade Agreements: Discriminatory or Non-discriminatory?

    Directory of Open Access Journals (Sweden)

    Innwon Park

    2016-12-01

    Full Text Available The RTAs with trade facilitation provisions have been expected to generate a larger net trade-creating effect and complement the discriminatory feature of RTAs but have yet to be empirically proven. Recognizing the limitations of existing studies, we conducted a quantitative analysis on the effects of RTAs with and without trade facilitation provisions on both intra- and extra-bloc trade by using a modified gravity equation. We applied the Poisson Pseudo-Maximum Likelihood (PPML estimation with time varying exporter and importer fixed effect method to panel data consisting of 45,770 country pairs covering 170 countries for 2000-2010. We found that the trade facilitation provisions in existing RTAs are non-discriminatory by generating more intra- and extra-bloc trade in general. In particular, we found that the trade effects of RTAs in the APEC region are much stronger than the general case covering all RTAs in the world. In addition, as we control the trade effect of a country's trade facilitation, which is ranked by the World Bank's logistic performance index, RTAs consisting of trade facilitation provisions are discriminatory for trade in final goods and non-discriminatory for trade in intermediate goods. Overall, we endeavor to "explain," instead of "hypothesizing," why most of the recent RTAs contain trade facilitation provisions, especially in light of the deepening regional interdependence through trade in parts and components under global value chains and support the necessity of multilateralizing RTAs by implementing non-discriminatory trade facilitation provisions.

  3. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  4. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  5. On Issue of Algorithm Forming for Assessing Investment Attractiveness of Region Through Its Technospheric Security

    Science.gov (United States)

    Filimonova, L. A.; Skvortsova, N. K.

    2017-11-01

    The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.

  6. Household food security and adequacy of child diet in the food insecure region north in Ghana.

    Directory of Open Access Journals (Sweden)

    Pascal Agbadi

    Full Text Available Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity. In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators.Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871, descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project.Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards.Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results

  7. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  8. A Catalyst for Change: Drought and Food Security in the Near East Region (Invited)

    Science.gov (United States)

    Knutson, C. L.

    2010-12-01

    In the Near East, drought at the turn of the 21st century was reported to be the worst in 50 years, affecting millions of people across the region. The drought caused a wide range of effects, including widespread crop failures and livestock losses, increased drinking water shortages and disease stress, additional debt, and forced mass migrations to urban areas and other countries, all of which affected food security. As devastating as the drought was for people and the environment, the event created a “policy window” - a time during which the public’s and policy makers’ attention was directed toward a particular issue, creating an advantageous political environment for addressing the problem. In this case, the drought revealed the need for enhanced mitigation and drought relief coordination. It has served as the impetus for several countries and international organizations to work together to foster new policies and training activities to reduce drought risk and enhance food security in the region.

  9. Impacts of Climate Change on Colombia’s National and Regional Security

    Science.gov (United States)

    2009-10-01

    Peru, and Chile have relatively diverse, industrialized economies and greater domestic resources and state capaci- ties for adaptation. Bolivia...Change on Colombia’s National and Regional Security References 1 Colombia, Sistema de Informacion sobre el Uso del Agua en la Agricultura y el Medio...Jul 2009. "El cambio climatico en Colombia." Unpublished report shared with authors. IDEAM. 26 "El agua para 40 millones de personas esta en riesgo

  10. INDIA’S GROWING INFLUENCE IN STABILIZING REGIONAL SECURITY IN SOUTHEAST ASIA

    Science.gov (United States)

    2016-02-16

    East Policy’ focusing on engagement with Southeast Asia .2 Following the reforms, Indian economy grew rapidly with an...civilizational neighbors in Southeast Asia and East Asia .”19 Thus, LEP and recognition of India’s economic, political, security and cultural potential by ASEAN...point. 21 During the 10th East Asia Summit, Prime Minister Modi emphasized the importance of South East Asian region and informed that his

  11. Form Characteristics of Regional Security Organizations - The Missing Link in the Explanation of the Democratic Peace

    OpenAIRE

    Dembinski, Matthias; Freistein, Katja; Weiffen, Brigitte

    2006-01-01

    This paper contributes both to the debate on the effects of regional security organizations and to the debate on democratic peace. It argues that even if international organizations as such may not be able to influence the conflict behavior of their member states, the subgroup of interdemocratic institutions is well suited to do so. The form of interdemocratic institutions differs in two significant respects from the form of traditional institutions: they are more densely connected via transn...

  12. Improving Regional Security in Central America: Military Engagement Options for Nicaragua

    Science.gov (United States)

    2002-12-01

    of Disasters) Guatemala, Guatemala. Secretaria de Integracion Economica Centroamericana. 68 Smith, Peter H. 2000. Talons of the Eagle: Dynamics of...for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection...an essential role in the stability and security of the Central American sub region. The de -stabilizing influence of Sandinista policies in the 1980s

  13. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  14. Central Asia as a Regional Security Complex from the Perspectives of Realism, Liberalism and Constructivism

    Directory of Open Access Journals (Sweden)

    Caroline Putri Pratama

    2013-05-01

    Full Text Available Tulisan ini bertujuan menganalisis kawasan Asia Tengah, dilihat dari perspektif Realisme, Liberalisme dan Konstruktivisme, melalui teori Regional Security Complex oleh Barry Buzan dan Ole Waever. Teori ini hendak menunjukkan keamanan regional berdasarkan interdependensi antar unit dalam kawasan dilihat dari struktur power dan proses sekuritisasi di dalamnya, demikian pola hubungan keamanan dalam kawasan Asia Tengah berusaha dijelaskan dengan elemen-elemen dari ketiga paradigma yang terdapat dalam teori tersebut. Hasil analisis tulisan ini menunjukkan bahwa Asia Tengah dipandang sebagai bentuk insecurity interdependence by external forces dari perspektif Realis, security interdependence by interest dari perspektif Liberalis dan securitization interdependence by understanding of threat/security dari perspektif Konstruktivis. Kompleks keamanan Asia Tengah termasuk dalam tipe kompleks keamanan Great Power, terlihat dari peran besar kekuatan-kekuatan eksternal terutama Rusia dan Cina dalam kawasan tersebut; baik dalam pembentukan pola pertemanan dengan kerjasama, pola permusuhan dengan persaingan dan ketakutan, juga proses sekuritisasi isu separatisme, ekstremisme dan terorisme sebagai ancaman terhadap keamanan regional.Tulisan ini diambil dari tugas karya akhir penulis yang diajukan untuk medapatkan gelar Sarjana Sosial dari Departemen Ilmu Hubungan Internasional, Universitas Indonesia.

  15. The Text of the Agreement for conducting under the Auspices of the Agency. A Regional Joint Training and Research Programme using a Neutron Crystal Spectrometer

    International Nuclear Information System (INIS)

    1964-01-01

    On 11 June 1964 the Board of Governors approved an Agreement for conducting, under the auspices of the Agency, a regional joint training and research programme using a neutron crystal spectrometer. The text of that Agreement is reproduced in this document for the information of all Members. The entry into force of the Agreement in accordance with Section 17 thereof, as well as later acceptances by additional Governments, will be notified to Members in addenda to this document

  16. The Text of the Agreement for conducting under the Auspices of the Agency. A Regional Joint Training and Research Programme using a Neutron Crystal Spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1964-07-22

    On 11 June 1964 the Board of Governors approved an Agreement for conducting, under the auspices of the Agency, a regional joint training and research programme using a neutron crystal spectrometer. The text of that Agreement is reproduced in this document for the information of all Members. The entry into force of the Agreement in accordance with Section 17 thereof, as well as later acceptances by additional Governments, will be notified to Members in addenda to this document.

  17. Accounting and Control in Ensuring Economic Security of the Organizations of Perm Region

    Directory of Open Access Journals (Sweden)

    Vyacheslav Valetyevich Epishin

    2016-09-01

    Full Text Available The article deals with the urgent problem concerning the regional development as well as the specific organization, or to the development of an integrated system of economic security of the organization. The article discusses the importance of such an element of economic security (including the financial security as the accounting and control as well as their possible violations. The authors substantiate their position on the relationship of the violations of accounting and control and also the internal theft, other economic crimes and their negative consequences. The analysis of the existing national and foreign sources related to the subject of the study is carried out. The conclusion is made about the lack of modern research devoted to the study of the protective properties of accounting, control and their violations, which condition economic crimes. The methodological tools of the research include dialectic method, systemic analysis, complex sociological methods: the analysis of the legal sources, of statistical information and judicial practice. On the basis of the analysis of criminal cases, financial statements, publications media, the authors made the conclusion about the conditionality of the theft in the organizations as there are the violations of accounting and control, low efficiency of control and auditing, of preventive measures for neutralization of the violations of accounting and control from the services of economic security, accounting offices, auditing and law enforcement services. The recommendations for the optimization of this work are introduced. They can be used by accounting departments, auditing bodies, fiscal authorities at the municipal and regional level and by law enforcement officials. The economic security is necessary for any organizations regardless of their forms of ownership, ranging from government organizations to small kiosks. The difference will only consist in the means and methods.

  18. Prospects and challenges for new security arrangements in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Hong, Mark

    1992-01-01

    The topics covered in this presentation are as follows: prospects and challenges for arms limitations; cooperation for new regional security arrangements; role of the United nations in conflict prevention, peace-keeping and disarmament. Developments in former Soviet Union which create concern are: the possible dispersion of Russian nuclear expertise and personnel to would be nuclear powers; the continuing friction between Russia and Ukraine over disposal of ex-Soviet ICBMs and tactical nuclear weapons, and the transfer to Russia of 3000 nuclear warheads in Ukraine; the Black Sea fleet, and the Crimea question. These dramatic events have global as well as regional impact as Russia is an Asia-Pacific Country

  19. Import dependence of industrial enterprises in the region as an economic security hazard

    Directory of Open Access Journals (Sweden)

    A. N. Makarov

    2010-12-01

    Full Text Available Import is traditionally considered as a source for saturation of a home market with scarce commodities or goods non-manufactured in an importing country. However, the larger is the share of import in the total volume of deliveries, the greater is the hazard for economic security of the region and for the state upon the whole. The analysis has revealed the fact that in the regional industry there is a real situation of absolute import dependence. It means that enterprises have been functioning only based on import deliveries to manufacture some single components for products of production-technical purposes.

  20. Multi-membership and the effectiveness of regional trade agreements in Western and Southern Africa : A comparative study of ECOWAS and SADC

    NARCIS (Netherlands)

    S.K. Afesorgbor (Sylvanus Kwaku); P.A.G. van Bergeijk (Peter)

    2011-01-01

    textabstractUsing a gravity model for 35 countries and the years 1995-2006 we estimate the impact of regional trade agreements in Africa (in particular ECOWAS and SADC) and compare this to the a benchmark of North South trade integration (Europe’s preferential trade agreement). We find that •

  1. Political and security issues in the Asia-Pacific region: Assessment of trends

    International Nuclear Information System (INIS)

    Lehmann, R.F. II

    1992-01-01

    It should be emphasized that the fundamental shift has taken place in international relations, away from a world dominated by the bipolar super-Power confrontation. There is a today to be more concerned about regional instabilities, which are made more threatening by the potential proliferation of weapons of mass destruction. Just as every nation was affected by the cold war, regional instabilities and proliferation concern each member of the world community. In the Asia-Pacific region, the goal is clear: safer, more stable military postures; transparency and confidence-building; and stronger non-proliferation norms. In working together towards that goal, there is a need to foster greater security through bilateral and multilateral dialogue. In that way, one could promote the change within and among societies; that is the best hope for defusing regional tensions, preventing the spread of weapons of mass destruction, and building a lasting peace

  2. The text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1990-04-01

    The document reproduces the text of an African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology among African Member States that was endorsed by the Board of Governors on 21 February 1990

  3. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    Science.gov (United States)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy

  4. Security of water, energy, and food nexus in the Asia-Pacific region

    Science.gov (United States)

    Taniguchi, M.; Endo, A.; Fujii, M.; Shoji, J.; Baba, K.; Gurdak, J. J.; Allen, D. M.; Siringan, F. P.; Delinom, R.

    2014-12-01

    Water, energy, and food are the most important and fundamental resources for human beings and society. Demands for these resources are escalating rapidly because of increases in populations and changes in lifestyles. Therefore intensive demand for those resources makes conflicts between resources. Securities of water, energy, and food are treated separately, however they should be considered as one integrated matter, because water-energy-food are connected and it makes nexus and tradeoff. Security in terms of self-production, diversity of alternatives, and variability are evaluated for water, energy and food for thirty two countries in the Asia-Pacific region. The water and energy nexus includes water consumption for the cooling of power plant systems, water use for hydro power generation, and energy consumption for water allocation and pumping. The water and food nexus consists of water consumption for agriculture and aquaculture. The energy and food nexus includes energy consumption for food production and biomass for energy. Analyses of 11 countries within the Asia- Pacific region show that energy consumption for fish is the largest among foods in Japan, Philippines, and Peru, while energy consumption for cereals is the largest among foods in Canada, US, Indonesia, and others. Water consumption for different types of food and energy are also analyzed, including nexus ratio to total water consumption. The water-energy-food nexus at a local level in the Asia Pacific region are examined by the Research Institute for Humanity and Nature project "Human environmental security in Asia Pacific Ring of Fire". Themes including geothermal power plants for energy development and hot springs as water, shale gas for energy development and water consumption/contamination, aquaculture for food and water contamination are used to evaluate the water-energy-food nexus in the Asia-Pacific region.

  5. The Role of Vietnam in The ASEAN Regional Security Cooperation: From Mechanism Construction to Dispute Settlement

    Directory of Open Access Journals (Sweden)

    Li Chunxia

    2016-12-01

    Full Text Available In the context of the integration of ASEAN, Vietnam recognized that the strategic role of ASEAN is in its diplomacy. At the same time, to further improve the status in the region and in the international community, Vietnam has actively been participating in ASEAN affairs. Vietnam not only promoted the integration process of ASEAN, but also promoted the political security cooperation of ASEAN, in which Vietnam has advantages and wants to play a leading role. On the one hand, Vietnam promotes the construction of political security cooperation mechanisms, such as ARF, ADMM+, and so on; on the other hand, Vietnam took the South China Sea as a common concern, actively appeals for a common ASEAN position, to maximize its own benefit. Vietnam will further enhance and consolidate its status and role in ASEAN in the future.

  6. Regional Radiological Security Partnership in Southeast Asia - Increasing the Sustainability of Security Systems at the Site-Level by Using a Model Facility Approach

    International Nuclear Information System (INIS)

    Chamberlain, Travis L.; Dickerson, Sarah; Ravenhill, Scott D.; Murray, Allan; Morris, Frederic A.; Herdes, Gregory A.

    2009-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO), created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's Global Threat Reduction Initiative (GTRI) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP is to cooperate with countries in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports objectives to improve the security of high risk radioactive sources by raising awareness of the need and developing national programs to protect and control such materials, improve the security of such materials, and recover and condition the materials no longer in use. The RRSP has utilized many tools to meet those objectives including: provision of physical protection upgrades, awareness training, physical protection training, regulatory development, locating and recovering orphan sources, and most recently - development of model security procedures at a model facility. This paper discusses the benefits of establishing a model facility, the methods employed by the RRSP, and three of the expected outcomes of the Model Facility approach. The first expected outcome is to increase compliance with source security guidance materials and national regulations by adding context to those materials, and illustrating their impact on a facility. Second, the effectiveness of each of the tools above is increased by making them part of an integrated system. Third, the methods used to develop the model procedures establishes a sustainable process that can ultimately be transferred to all facilities beyond the model. Overall, the RRSP has utilized the Model Facility approach as an important tool to increase the security of radioactive sources, and to position facilities and countries for the long term secure management of those sources.

  7. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  8. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  9. Challenges of transfrontier conservation areas: Natural resources nationalism, security and regionalism in the southern African development community region

    Directory of Open Access Journals (Sweden)

    Oswell Rusinga

    2012-12-01

    Full Text Available Transfrontier Conservation Areas (TFCAs initiatives in the Southern African Development Community (SADC region offer hope for providing a mechanism for resolving political tensions and conflicts which are not only related to environmental issues but to security concerns as well. The geopolitical implications of TFCAs in the SADC region cannot be overemphasised with regard to international relations and regional integration. The SADS region is characterised by histories of contested military balance of power and geopolitical rivalries which have a potential to degenerate into military confrontation. Although there is a strong belief in multilateral co-operation among SADC member countries, most of them often engage the international community at the bilateral level. Moreover, there is disharmony in constitutional applications of the rule of law, respect of human rights and good governance. However, TFCAs initiatives in Southern Africa have been seen as offering an opportunity to heal the wounds of pre- and post-independence wars of destabilisation through the encouragement of inter-state collaboration and co-operation by giving governments an opportunity for mutual action on issues of common interest.

  10. Freshwater Ecosystem Service Flow Model To Evaluate Regional Water Security: A Case Study In Beijing-Tianjin-Hebei Region, China

    Science.gov (United States)

    Li, D.; Li, S.

    2016-12-01

    Freshwater service, as the most important support ecosystem service, is essential to human survival and development. Many studies have evidenced the spatial differences in the supply and demand of ecosystem services and raised the concept of ecosystem service flow. However, rather few studies quantitatively characterize the freshwater service flow. This paper aims to quantify the effect of freshwater ecosystem service flow on downstream areas in Beijing-Tianjin-Hebei (BTH) region, China over 2000, 2005 and 2010. We computed the freshwater ecosystem service provision with InVEST model. We calculated freshwater ecosystem service consumption with water quota method. We simulated the freshwater ecosystem service flow using our simplified flow model and assessed the regional water security with the improved freshwater security index. The freshwater provision service mainly depends on climatic factors that cannot be influenced by management, while the freshwater consumption service is constrained by human activities. Furthermore, the decrease of water quota for agricultural, domestic and industrial water counteracts the impact of increasing freshwater demand. The analysis of freshwater ecosystem service flow reveals that the majority area of the BTH (69.2%) is affected by upstream freshwater. If freshwater ecosystem service flow is considered, the water safety areas of the whole BTH account for 66.9%, 66.1%, 71.3%, which increase 6.4%, 6.8% and 5.7% in 2000, 2005 and 2010, respectively. These results highlight the need to understand the teleconnections between distant freshwater ecosystem service provision and local freshwater ecosystem service use. This approach therefore helps managers choose specific management and investment strategies for critical upstream freshwater provisions across different regions.

  11. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries. Acceptances of the Agreement and Pledges of Additional Contributions to the Centre. Information Received up to 31 December 1963

    International Nuclear Information System (INIS)

    1964-01-01

    The Government of the United Arab Republic, the Host State of the Middle Eastern Regional Radioisotope Centre for the Arab Countries, has notified the Agency that on the dates shown the following Arab States deposited with the Government instruments of acceptance of the Agreement establishing the Centre

  12. Pastoralists at War: Violence and Security in the Kenya-Sudan-Uganda Border Region

    Directory of Open Access Journals (Sweden)

    Jonah Leff

    2009-12-01

    Full Text Available The majority of those living in the border region of Kenya, Sudan, and Uganda are pastoralists, whose livelihoods are dictated by the upkeep and size of their herds. Harsh environmental conditions force pastoralists to migrate in search of water and pasturelands during the dry season. With limited access to water and competing rights to land, intertribal conflict arises when pastoralists from one tribe enter the territory of another. The increased availability of small arms in the region from past wars increasingly makes ordinary clashes fatal. Governments in the region have responded with heavy-handed coercive disarmament operations. These have led to distrust and subsequent violent clashes between communities and security providers. This report reviews the scale, consequences of, and responses to the many pastoral conflicts, utilizing methodological tools such as key informant interviews, retrospective analysis, and a thorough review of available literature.

  13. The IAEA regional cooperative agreement programme (RCA) on enhancement and harmonization of radiation protection in the Asia-Pacific Region (1998-2002)

    International Nuclear Information System (INIS)

    Cameron, R.F.; Oresegun, M.O.

    2000-01-01

    The IAEA Regional Cooperative Agreement (RCA) was initiated in 1972, and currently consists of 17 Member States from East Asia and Oceania. These countries are Australia, Bangladesh, China, India, Indonesia, Japan, Korea, Malaysia, Myanmar, Mongolia, New Zealand, Pakistan, Philippines, Singapore, Sri Lanka, Thailand and Vietnam. The RCA is one of three cooperative agreements under the aegis of the IAEA, the other two being for Africa (AFRA) and Latin America (ARCAL). The RCA agreement has been extended five times, as it meets particular needs of the participating countries. The region covered by the RCA comprises nearly half of the world's population and is undergoing a rapid expansion in nuclear power development and in the uses of radiation sources (radioactive materials and irradiating equipment). A number of activities in a wide range of areas of Agency interest are carried out under RCA. The Project to Strengthen Radiation Protection Infrastructures was initiated in 1988, as a five year programme, to offer a regional response to some of the radiation protection issues that were raised following the Chernobyl accident. It was extended into Phase 2 from 1993 to 1998 and has now reached a new phase. The IAEA has a dual role to establish standards in radiation protection and safety and to provide for their application. Since the status of the implementation of radiation safety laws and regulations is variable within the RCA countries, the primary focus has been on providing assistance to member states in the drafting of laws and regulations to ensure that sources are authorized and are properly controlled. A number of accidents worldwide have resulted from inappropriate or a complete lack of regulations on the control of sources. However as countries develop, their needs change and it is important that the RCA project in radiation protection changes with them. Hence the new Phase 3 programme in radiation protection has a mixture of events to strengthen radiation

  14. An Agreement to Disagree: The ASEAN Human Rights Declaration and the Absence of Regional Identity in Southeast Asia

    Directory of Open Access Journals (Sweden)

    Mathew Davies

    2014-01-01

    Full Text Available ASEAN’s engagement with human rights culminated in the creation of the ASEAN Human Rights Declaration in 2012. The Declaration is fascinating in three ways: Its institutional origins are surprising, it was agreed upon by states with very different positions on the role of human rights domestically, and it both contains commitments far in advance of some members and is at the same time dangerously regressive. The three leading frameworks that currently interrogate the Declaration fail to provide convincing insights into all three of those dimensions. To correct these shortcomings, this article applies the notion of an “incompletely theorized agreement” to the study of the Declaration, arguing that member states understand the Declaration in very different ways and agreed to it for similarly diverse reasons. Further, I argue that the Declaration neither articulates a shared regional identity relating to respect for human rights, nor can it be understood as marking an early point towards the creation of this identity. Instead, the current diversity of regional opinions on human rights and democracy is perceived as legitimate and will endure. The article concludes by considering whether this denudes the Declaration of value, arguing that its importance will vary: The more progressive the member state, the more important the Declaration will be in the future.

  15. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  16. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  17. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  18. Iran's Relations to the East: Nonproliferation and Regional Security in a Changing Southwest Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tehsin, Muhammad [Quaid-I-Azam Univ., Islamabad (Pakistan)

    2014-11-01

    This study attempts to answer the following questions: would a successful JPOA result in nuclear nonproliferation and regional security in Southwest Asia; and could the Middle East and South Asia work together to contain the threat of Salafi jihadism?

  19. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

    OpenAIRE

    Xie, Jianwei; Ulukus, Sennur

    2014-01-01

    The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints, have been determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4], respectively. In this paper, we determine the entire s.d.o.f. regions of these two channel models. The converse for the MAC follows from a middle step in the converse of [1,2]. The converse for t...

  20. NEW APPROACHES TO ENERGY SECURITY IN THE BALTIC SEA REGION: RUSSIAN VIEWPOINT

    OpenAIRE

    Irina Zeleneva

    2013-01-01

    NEW APPROACHES TO ENERGY SECURITY IN THE BALTIC SEA REGION: RUSSIAN VIEWPOINT By 2050, we can expect dramatic changes in the global energy balance. At the beginning of 21st century, the configuration of the global energy market has begun to change due to a wide variety of both political and economic reasons. The formation of a European common gas market in the world of fierce competition among world exporters for short-term and long-term contracts, the growth of energy consumption in China, J...

  1. Trade Agreements PTI

    Data.gov (United States)

    Department of Homeland Security — The objective of the Trade Agreements PTI is to advance CBP’s mission by working with internal and external stakeholders to facilitate legitimate trade and address...

  2. Neoindustrialization as a factor in improving economic security of old-industrial regions

    Directory of Open Access Journals (Sweden)

    Ol’ga Aleksandrovna Romanova

    2012-06-01

    Full Text Available This paper proves that the paradigm of the world of the XXIcentury is neoindustrialization on the basis of alternativestrategic goals of the global economy associated with the formation of post-industrial society and financialization neoindustrialization. A systematic proposal for the driving forces and mechanisms for its implementation is suggested. It is shown that target-oriented approach can be successfully used at the regional level as a mechanism for economic neoindustrialization of an old-industrial region. Conceptual approach to developing comprehensive program of industrial development in the industrial region that implements the ideas of neoindustrialization in relation to industry of Sverdlovsk region is presented. It was found that the regional technology platform can be an effective tool for combining the interests of territorial and sectoral development. It is proved that the idea of neoindustrialization can be realized only as a result of wise industrial policy and road map formation for the movement to an entirely new high-tech based industrial development. In the process of forming, the problem of neoindustrialization of a «pure» market as a factor in increasing the economic security is actualized.

  3. FOOD INDUSTRY DEVELOPMENT IN THE CONTEXT OF THE FOOD SECURITY OF REGIONS OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Mykolaichuk

    2017-12-01

    Full Text Available The purpose of the study is to substantiate the food security needs in the regions of Ukraine, as well as the definition of tasks in filling the market with own production products. The obtained results will determine the directions of structural changes in agricultural complexes of the regions and the necessary measures by the public regulatory bodies. Methodology. The research is based on a comparison of results of normative and search forecasts. In developing normative forecasts, the projected population and needs in different types of products according to the norms of rational consumption are taken into account. Search forecasts provide for the definition of a future state of satisfaction with the preservation of existing development trends. The gap between the necessary and projected results determines the task of accelerating growth. In terms of national security, food production should be provided with its own raw material base. Therefore, an analysis of the conditions for the development of livestock and crop production is necessary, which enables to substantiate the directions of systemic changes in agricultural complexes of the regions. In order to ensure positive changes in the structure of agricultural production, strengthening the effectiveness of public regulation on the basis of financial and economic leverage is needed. Results. Regions of Ukraine by territory and population exceed certain countries of the European Union. Significant differences in socio-economic conditions of the regions contribute to the growth of tension in society and migration. The events of recent years indicate the possibility of external interference in the functioning of the regions of Ukraine and the danger of the collapse of cooperative ties. Therefore, it is important to ensure the satisfaction of the immediate needs of the population of each region at the expense of its own production. Among the necessities, food occupies a special place. Complete

  4. Regional Integrated Tenets to Reinforce the Safety and Security of Radioactive Sources (ClearZone)

    International Nuclear Information System (INIS)

    Salzer, P.

    2003-01-01

    The EURATOM Research and Training Programme on Nuclear Energy includes 2 main fields - fusion energy research and management of radioactive waste, radiation protection and other activities of nuclear technology and safety.Seven instruments (mechanisms) for projects management are used - 'Network of Excellence' (NOE); 'Integrated Project' (IP); 'Specific Targeted Research Project' or 'Specific Targeted Training Project' (STREP); 'Co-ordination Action' (CA); Actions to Promote and Develop Human Resources and Mobility Specific Support Actions; Integrated Infrastructure Initiatives. Two consecutive sub-projects are proposed: 'small' - countries of the Visegrad four + Austrian participant -within the 6th FP 'Specific Supported Actions' and 'large' - participation of more countries in the region - more oriented to practical implementation of the 'small' project findings - intention to use the 6th Framework Programme resources to co-financing the implementation activities. The main objectives are: to create effective lines of defense (prevention -detection - categorization - transport - storage) against malicious use of radioactive sources; to achieve and maintain a high level of safety and security of radioactive sources; to arise the radioactive sources management safety and security culture at the Central European region. Consortium of 11 organisations from Czech Republic, Slovak Republic, Austria, Hungary and Poland is established for the Project implementation. The Project task are grouped in the following areas: legislation, infrastructure, practices; metallurgical industry, cross border control; instrumentation and metrology; information system

  5. Energy security and pattern of regional conflicts in Eurasia: From a constructive framework of analysis

    Directory of Open Access Journals (Sweden)

    Nalin Mohapatra

    2018-02-01

    Full Text Available The term energy security is undergoing a sea change from a state-centric economic conception to a sociological one. The definitional aspect is undergoing a transformation because of the changing pattern of relations between “energy producing and consuming states” along with “transit states”. Eurasia is one such region where the broader definition of energy security can be applicable. The existence of historically rooted social conflicts like Chechnya, South Ossetia, Crimea, “simmering discontent” in Siberia and Far East, and primordial apprehensions between ethnic groups (Armenian and Azeri in Nagorno Karabakh are providing a structural basis for the accentuation of regional conflicts. Most of these conflicts are taking place in Eurasia due to existence of natural resources like energy. Often competition over controlling transportation corridor is also generating societal tension. Some of these trajectories are putting this geopolitical space into a “cauldron.” Against this backdrop, Constructivism is emerging as a major theoretical approach to study the securitization processes in Eurasia.

  6. The text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1993-02-01

    The document informs that as of 31 January 1993, the following states sent to the Director General notifications of acceptance of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology: Tunisia, Egypt, Algeria, Nigeria, Madagascar, Libyan Arab Jamahiriya, Morocco, Kenya, Sudan, Ghana, Tanzania, Mauritius, Cameroon, South Africa and Zaire. The Agreement entered into force on 4 April 1990

  7. Globalisation, Geopolitics and Energy Security in Central Eurasia and the Caspian Region

    Energy Technology Data Exchange (ETDEWEB)

    Amineh, Parvizi Mehdi

    2003-07-01

    The demise of the Soviet Union and its subsequent break-up into 15 independent states gave rise to totally new political and strategic circumstances, which also extended into Central Eurasia and the Caspian Region. The eight newly independent states of this region have become one of the most important geopolitical areas in the post-Cold War era, due to a combination of its geographical position and significant oil and gas reserves. The region's resources are vital for advanced industrialised countries and figure prominently in Western geostrategic and economic interests in the twenty-first century. Intense competition, as well as co-operation, among various state and non-state actors for the control of these resources is emerging, also known as the New Great Game. The main actors involved in Central Eurasia and the Caspian region are identified as follows: inner circle actors (Russia, Iran, and Turkey), outer circle actors (China, India, Pakistan, and Afghanistan), external actors (the United States, the European Union and its particular member states), and non-state actors (ethno-religious groups, Transnational Corporations, crime groups, etc.). The author analyses the New Great Game by using a neo-geopolitical perspective. An important element towards control of the region's energy resources is the construction of transport routes. The question of where to construct pipelines engenders considerable conflicts between the interested players that could create obstacles to building the most economically viable and secure pipelines. Transportation of energy resources to the global market is also subject to conflicts between different forces within the Central Eurasian region, including ethno-religious conflicts. Problems such as lack of infrastructure and technology, and finding a solution for the Caspian legal regime dispute could pose further obstacles to prospective pipeline construction. The book analyses these and other important local and geopolitical

  8. Globalisation, Geopolitics and Energy Security in Central Eurasia and the Caspian Region

    International Nuclear Information System (INIS)

    Amineh, Parvizi Mehdi

    2003-01-01

    The demise of the Soviet Union and its subsequent break-up into 15 independent states gave rise to totally new political and strategic circumstances, which also extended into Central Eurasia and the Caspian Region. The eight newly independent states of this region have become one of the most important geopolitical areas in the post-Cold War era, due to a combination of its geographical position and significant oil and gas reserves. The region's resources are vital for advanced industrialised countries and figure prominently in Western geostrategic and economic interests in the twenty-first century. Intense competition, as well as co-operation, among various state and non-state actors for the control of these resources is emerging, also known as the New Great Game. The main actors involved in Central Eurasia and the Caspian region are identified as follows: inner circle actors (Russia, Iran, and Turkey), outer circle actors (China, India, Pakistan, and Afghanistan), external actors (the United States, the European Union and its particular member states), and non-state actors (ethno-religious groups, Transnational Corporations, crime groups, etc.). The author analyses the New Great Game by using a neo-geopolitical perspective. An important element towards control of the region's energy resources is the construction of transport routes. The question of where to construct pipelines engenders considerable conflicts between the interested players that could create obstacles to building the most economically viable and secure pipelines. Transportation of energy resources to the global market is also subject to conflicts between different forces within the Central Eurasian region, including ethno-religious conflicts. Problems such as lack of infrastructure and technology, and finding a solution for the Caspian legal regime dispute could pose further obstacles to prospective pipeline construction. The book analyses these and other important local and geopolitical aspects to

  9. Acordos bilaterais de comércio como estratégia de inserção regional e internacional do Chile Bilateral trade agreements as Chile's strategy for regional and international insertion

    Directory of Open Access Journals (Sweden)

    Renata Rossetto Lopes

    2010-12-01

    exhaustion of the unilateral tariff reduction, today in 6% for the majority of products, in trade creation. Nevertheless, the implementation of a large and diversified net of bilateral trade agreements also have political, strategic and security interests regarding the neighbors and near countries. This strategy also gives Chile the choice of not taking part in regional blocks to guarantee its interests, which increases its ability to deal with different and important partners in the international level.

  10. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [fr

  11. Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Project and Supply Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Project and Supply Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Poland on 8 January 2007, the United States on 12 January 2007 and by the Director General of the IAEA on 16 January 2007. Pursuant to the Article XII of the Agreement, the Agreement entered into force on 16 January 2007, upon signature by the representatives of Poland, the United States and the Director General of the IAEA

  12. Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Portugal on 27 June 2006 and the United States on 13 December 2006, and by the Director General of the IAEA on 14 December 2006. Pursuant to the Article XII.1 of the Agreement, the Agreement entered into force on 19 April 2007, the date on which the Agency received written notification from Portugal that its internal requirements for entry into force had been met

  13. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States

  14. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [es

  15. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  16. The regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    Fowler, E.

    1978-01-01

    The history of the Agreement, known as the RCA, is given and the operation of the Agreement, its achievements and current projects are described. The Agreement entered into force in 1972 for a period of five years and has been extended for an additional five years. Any IAEA Member State in the area of South Asia, South East Asia, the Pacific and the Far East may become a party to the Agreement. The purpose of the Agreement is to promote and co-ordinate research, development and training projects in nuclear science and technology through co-operation between the appropriate national institutions and with the assistance of the IAEA. The current RCA co-operative projects cover a broad spectrum of technologies and interests, among which are: food and agriculture, medicine, environmental research, industrial applications, training, research reactor use including radioisotope production, and physical research such as nuclear data programs

  17. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  18. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  19. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  20. What are the determinants of food security among regional and remote Western Australian children?

    Science.gov (United States)

    Godrich, Stephanie L; Davies, Christina R; Darby, Jill; Devine, Amanda

    2017-01-22

    To explore how determinants of food security affect children in regional and remote Western Australia (WA), across food availability, access and utilisation dimensions. The Determinants of Food Security framework guided the thematic analysis (using NVivo 10) of semi-structured interviews with 20 key informants. Food availability factors included availability, price, promotion, quality, location of outlets and variety. Food access factors included social support, financial resources, transport to food outlets, distance to food outlets and mobility. Food utilisation factors included nutrition knowledge and skills, children's food preferences, storage facilities, preparation and cooking facilities and time to purchase food. Key food availability recommendations include increasing local food supply options. Food access recommendations include ensuring equitable formal social support and empowering informal support options. Food utilisation recommendations include prioritising food literacy programs focusing on quick, healthy food preparation and budgeting skills. Implications for public health: Policymakers should invest in local food supply options, equitable social support services and experiential food literacy programs. Practitioners should focus child/parent programs on improving attitude, knowledge and skills. © 2017 Public Health Association of Australia.

  1. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    Science.gov (United States)

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  2. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Directory of Open Access Journals (Sweden)

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  3. Agreement between self-reported and physically verified male circumcision status in Nyanza region, Kenya: Evidence from the TASCO study.

    Science.gov (United States)

    Odoyo-June, Elijah; Agot, Kawango; Mboya, Edward; Grund, Jonathan; Musingila, Paul; Emusu, Donath; Soo, Leonard; Otieno-Nyunya, Boaz

    2018-01-01

    Self-reported male circumcision (MC) status is widely used to estimate community prevalence of circumcision, although its accuracy varies in different settings depending on the extent of misreporting. Despite this challenge, self-reported MC status remains essential because it is the most feasible method of collecting MC status data in community surveys. Therefore, its accuracy is an important determinant of the reliability of MC prevalence estimates based on such surveys. We measured the concurrence between self-reported and physically verified MC status among men aged 25-39 years during a baseline household survey for a study to test strategies for enhancing MC uptake by older men in Nyanza region of Kenya. The objective was to determine the accuracy of self-reported MC status in communities where MC for HIV prevention is being rolled out. Agreement between self-reported and physically verified MC status was measured among 4,232 men. A structured questionnaire was used to collect data on MC status followed by physical examination to verify the actual MC status whose outcome was recorded as fully circumcised (no foreskin), partially circumcised (foreskin is past corona sulcus but covers less than half of the glans) or uncircumcised (foreskin covers half or more of the glans). The sensitivity and specificity of self-reported MC status were calculated using physically verified MC status as the gold standard. Out of 4,232 men, 2,197 (51.9%) reported being circumcised, of whom 99.0% were confirmed to be fully circumcised on physical examination. Among 2,035 men who reported being uncircumcised, 93.7% (1,907/2,035) were confirmed uncircumcised on physical examination. Agreement between self-reported and physically verified MC status was almost perfect, kappa (k) = 98.6% (95% CI, 98.1%-99.1%. The sensitivity of self-reporting being circumcised was 99.6% (95% CI, 99.2-99.8) while specificity of self-reporting uncircumcised was 99.0% (95% CI, 98.4-99.4) and did not differ

  4. Challenges to the South Caucasus regional security aftermath of Russian–Georgian conflict: Hegemonic stability or new partnership?

    Directory of Open Access Journals (Sweden)

    Kornely K. Kakachia

    2011-01-01

    And the question is now how to handle this delicate situation in a strategically and geopolitically important region. So by controlling Georgia (in case Russia reaches abovementioned aims, Russia actually will be able to cut off Central Asia and Caspian resources. It means Russia would be able to isolate and cut off Azerbaijan and Central Asian countries and it will significantly strengthen its energy monopoly over Europe with all results coming out from that fact. So it’s about major shift in the energy policy and major shift in geopolitics based on this energy policy and Russian energy monopoly. The August war in Georgia demonstrated some risks associated with the functioning of the transit energy corridor in the southern Caucasus. It also demonstrated the need for broader security guarantees for a region that is vital to European and global energy security. Paper deals with economic damage inflicted by the Russo-Georgian war in South Caucasus and its implications for regional security.

  5. 78 FR 9406 - Southwest Louisiana Area Maritime Security Regional Sub-Committee; Vacancies

    Science.gov (United States)

    2013-02-08

    ..., review, update, and exercising of the Area Maritime Security (AMS) Plan for their area of responsibility... port stakeholders having a special competence in maritime security; and port stakeholders affected by...

  6. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    National Research Council Canada - National Science Library

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  7. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [es

  8. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it

  9. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [fr

  10. Impact of climate change on food security in southwest coastal region of bangladesh

    International Nuclear Information System (INIS)

    Islam, S.; Rahman, A.

    2014-01-01

    This paper examines the impact of climate change on food security of the population residing in the coastal area of Bangladesh. Based on multistage random sampling technique, a survey was conducted to collect socioeconomic and food datasets of the people affected by extreme climate events in the country. The study found that climate change caused food insecurity in the region; it led to greater dependence on pond and rain water for cooking food and water intake. Catastrophe due to extreme weather events adversely affected the livelihoods and level of income. The severe cyclonic storms, Sidr (November 2007) and Alia (May 2009) severely affected the vulnerable people of this region, especially the extremely poor. The study came out with several coping strategies to address adverse effects of climate change, including rehabilitation with income and employment generating activities and development training; alternative livelihood adaptation practices; access to subsidized inputs and credits; introduction of crop calendar; conservation of arable and fellow land; and innovation of saline-tolerant, heat-resistant, moderate water consuming and short-rotation crops for the coastal people. (author)

  11. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq.

    Science.gov (United States)

    Shukor, Ali R; Klazinga, Niek S; Kringos, Dionne S

    2017-08-23

    This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and political crises. The descriptive analysis used a framework operationalizing Starfield's classic primary care model for health services research. A scoping review was performed using relevant sources, and expert consultations were conducted for completing and validating data. The descriptive analysis presents a complex narrative of a primary care system undergoing classical developmental processes of transitioning middle-income countries. The system is simultaneously under tremendous pressure to adapt to the continuously changing, complex and resource-intensive needs of sub-populations exhibiting varying morbidity patterns, within the context of protracted security, humanitarian, economic, and political crises. Despite exhibiting significant resilience in the face of the ongoing crises, the continued influx of IDPs and Syrian refugees, coupled with extremely limited resources and weak governance at policy, organizational and clinical levels threaten the sustainability of KRI's public primary care system. Diverse trajectories to the strengthening and development of primary care are underway by local and international actors, notably the World Bank, RAND Corporation, UN organizations and USAID, focusing on varying imperatives related to the protracted humanitarian and economic crises. The convergence, interaction and outcomes of the diverse initiatives and policy approaches in relation to the development of KRI's primary care system are complex and highly uncertain. A common vision of primary care is required to align resources, initiatives and policies, and to enable synergy between all local and international actors involved in the developmental and humanitarian response. Further

  12. Import substitution and its role in food security and agricultural development in the region

    Directory of Open Access Journals (Sweden)

    E. V. Pastushkova

    2017-01-01

    Full Text Available The article presents the analysis of the security of the food market during the period 2010-2015, with an account of modern conditions of economy of the Russian Federation. The volume of production (manufacturing of major food products in Russia in the period 2010-2015 indicate the increase in domestic production of food products such as meat products, fish and fish products, frozen fruits and vegetables, milk and dairy products. Key categories of micro-economic analysis is supply and demand in selected markets. On the basis of information about the diets of the population per capita in the region and Russia as a whole, revealed that the consumption of meat and meat products, eggs complies with the standards. The problem of formation of demand for food products is relevant due to the fact that consumption and demand for food in large parts of the population formed at an insufficient level due to low incomes. In examining the share of imported products in the food market of the Russian Federation, it was identified that there is a dependency on the following inventory: beef (import share of 57.3%, animal oil (34.4 per cent and cheese (37.3 per cent. In the conditions of modern development of the economy another important factor is the state support of import substitution advocating a kind of incentive for the development and protection of own food production. Assessment of the dynamics of foreign trade turnover of trade in the region helps to identify trends in the development of relations in the region. The analysis of the index of foreign trade of the Urals Federal district in the period 2012-2016 has undergone minor changes, this fact is due to the introduction of foreign sanctions. Import substitution is one of the main factors contributing to implement large-scale and deep modernization of the domestic agricultural sector, causing the use of leading technology.

  13. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations; Texto de los Acuerdos de Colaboracion del Organismo con las Organizaciones Intergubernamentales Regionales

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [Spanish] Para conocimiento de todos los Estados Miembros del Organismo, en este documento se transcriben en el orden en que entraron en vigor, los acuerdos de colaboracion que el Organismo ha concertado con las organizaciones intergubernamentales regionales que a continuacion se enumeran, junto con los respectivos protocolos de autenticacion.

  14. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA)

    International Nuclear Information System (INIS)

    1998-01-01

    As of 4 May 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 22 African States. Zimbabwe is added to the list of 21 States reported in the previous edition (add. 9) to this document. Extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  15. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations; Texte des Accords de Cooperation Conclus entre L'Agence et des Organisations Intergouvernementales Regionales

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [French] Le present document reproduit le texte des accords de cooperation que l'Agence a conclus avec les organisations intergouvernementales regionales enumerees ci-apres, ainsi que celui des protocoles validant lesdits accords. Le texte de ces instruments, classes dans l'ordre chronologique de leur entree en vigueur, est communique, pour information, a tous les Membres de l'Agence.

  16. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-15

    As of 4 May 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 22 African States. Zimbabwe is added to the list of 21 States reported in the previous edition (add. 9) to this document. Extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  17. OC10 - Inter-rater agreement of the Paediatric Early Warning Score tools used in the central Denmark region

    DEFF Research Database (Denmark)

    Jensen, Claus Sixtus; Aagaard, Hanne; Vebert Olesen, Hanne

    2016-01-01

    through simultaneous blinded PEWS assessment on the same patients by two nurses. Fleiss' kappa was utilized to determine the level of agreement among the raters. CONCLUSION: With a paucity of published reliability testing studies, this research attempts to address identified research gaps and will thus...

  18. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1998-01-01

    As of 31 January 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology(INFCIRC/377), has been received by the Director General of the IAEA from the Governments of 21 African States. Uganda is added at the at the list of 20 African States reported in the previous addition to the document (INFCIRC/377/Add.8). Pursuant to Article XIV.2 of the original Agreement the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  19. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1997-01-01

    As of 31 December 1996, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (see INFCIRC/377), had been received by the Director General from the Governments of 20 African countries. Niger, Libya and Mali are added at the list of 17 countries reported in the previous addition of the document (INFCIRC/377/Add.7). Pursuant to Article XIV.2 of the original Agreement, the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  20. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-24

    As of 31 January 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology(INFCIRC/377), has been received by the Director General of the IAEA from the Governments of 21 African States. Uganda is added at the at the list of 20 African States reported in the previous addition to the document (INFCIRC/377/Add.8). Pursuant to Article XIV.2 of the original Agreement the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  1. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-28

    As of 31 December 1996, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (see INFCIRC/377), had been received by the Director General from the Governments of 20 African countries. Niger, Libya and Mali are added at the list of 17 countries reported in the previous addition of the document (INFCIRC/377/Add.7). Pursuant to Article XIV.2 of the original Agreement, the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  2. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  3. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrella, F.

    1993-01-01

    Paper deals with a new emerging international system of security with the emphasis on the regional contribution, especially position of Argentina, non-proliferation policy, comprehensive safeguards, safeguards agreements, technology developments and responsibilities and opportunities related to the disarmament issues

  4. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  5. Household Perceptions about the Impacts of Climate Change on Food Security in the Mountainous Region of Nepal

    Directory of Open Access Journals (Sweden)

    Shobha Poudel

    2017-04-01

    Full Text Available This study tried to understand the mountainous households’ perception of climate change and its impacts on food security in the Lamjung district of Nepal. The study attempted to find out changes in households food security and daily activities in the face of climate change for the last twenty years. The study started with the 150 household surveys along with participatory rural appraisal to understand the climate change perception of local people and its impact on dimensions of food security. Households expressed different levels of perception in terms of climate change on food security. The result shows that most of the mountainous households experienced increased temperature, less rainfall in winter, an increasing number of natural disasters and the emergence of insects for the last twenty years. They perceived the role of climate change in decreased crop production, decreased dairy products and increased household work. The situation of food security is likely to be more vulnerable to climate change in the future. It was also observed that households have been using different autonomous adaptation measures, such as high yielding crop varieties, enhanced irrigation systems and fertilizers, to cope with the changing climate. Finally, the study recommended policy instruments to enhance food security in the mountainous region amidst changing climate.

  6. World market or regional integration and food security in West Africa

    NARCIS (Netherlands)

    L.J. de Haan (Leo); A. Klaasse Bos (Andries); C. Lutz (Clemens)

    1994-01-01

    textabstractThe problem of food security in West Africa was put on the international agenda in 1974 at the international food conference in Rome following the Great Sahelian Drought of 1968-1973. In those years preoccupation with food security was limited mainly to the Sahel countries and

  7. Regional Labour Court Baden-Wuerttemberg (Mannheim), decision of November 24, 1986 (co-determination in matters of security control)

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    In its decision of November 24, 1986, the Regional Court of Baden-Wuerttemberg deals with the direction of security controls in nuclear research plants. The co-determination of the works council in this field is excluded, if the operator is directed by the licensing authority to carry out these controls pursuant to an obligation of the operating licence according to sec. 7 and sec. 17 of the Atomic Energy Act. With regard to the security purpose in sec. 1 no. 2 Atomic Energy Act only the operator is competent to make decisions in these cases. (WG) [de

  8. Convenio "Andres Bello:" Informe Final [de la] Segunda Reunion de Ministros de Educacion de la Region Andina ("Andres Bello" Agreement: Final Report of the Second Meeting of the Andean Region Ministers of Education).

    Science.gov (United States)

    Ministros de Educacion de la Region Andina, Lima (Peru).

    This final report of the second meeting of the Andean Region Ministers of Education subscribing to the Andres Bello Agreement on education and culture contains a resume of the individual sessions and the proposals approved during that meeting. The proposals cover various educational problems and issues and begin with the Declaration of Lima which…

  9. Evidence-Based Model of Integration of Regions for Ensuring Economic Security and Sustainable Development of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Olga O. Smirnova

    2017-01-01

    Full Text Available Purpose: the main objective of preparation of article consists in formation of conceptual reasons for the new approach to administrative-territorial division of the Russian Federation corresponding to the relevant calls facing the country in the modern economic conditions. For achievement of this purpose in article the following research tasks are delivered and successfully solved: 1 to create new approach to administrative-territorial division of the Russian Federation on the basis of stability of her subjects; 2 to develop conceptual model of acceptance of the administrative decision on enlargement of regions by use of the modern methods of the quantitative and qualitative analysis of nature of regional development and a status of an economic security of the territory; 3 to define composition and structure of regional clusters, to give their characteristic in specific parametric space; 4 to develop recommendations about formation of administrative decisions on enlargement of regions taking into account specifics of development of the territories in a section of each cluster. Methods: by preparation of article general scientific methods of researches, such as systematization, generalization, cause-effect analysis and also receptions of the quantitative are used (hierarchical and iterative methods, statistic analysis and qualitative (methods of the spatial analysis, theory of image identification analysis. The new conceptual model based on synthesis of qualitative and quantitative methods of assessment of effectiveness of association of territories is developed for achievement of the goal of a research. According to the offered model making decision on association of the region is carried out in four steps. At the first stage justification of expediency of integration of territories is carried out and the general concept of association of regions is formed; at the second stage – holding a procedure of the cluster analysis and registration of

  10. Regional energy resource development and energy security under CO{sub 2} emission constraint in the greater Mekong sub-region countries (GMS)

    Energy Technology Data Exchange (ETDEWEB)

    Watcharejyothin, Mayurachat; Shrestha, Ram M. [School of Environment, Resources and Development, Asian Institute of Technology (Thailand)

    2009-11-15

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO{sub 2} emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO{sub 2} emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO{sub 2} emission reduction strategy would be less costly than that under the individual emission targets set for each country. (author)

  11. Regional energy resource development and energy security under CO2 emission constraint in the greater Mekong sub-region countries (GMS)

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO 2 emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO 2 emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO 2 emission reduction strategy would be less costly than that under the individual emission targets set for each country.

  12. The system of innovative development of the agroindustrial complex in order to ensure the economic security of the region

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2017-01-01

    Full Text Available The basis for innovative development of the agroindustrial complex is the goals, principles and methods that determine the economic security of the region. The category of “economic security”is often identified with the sustainability, competitiveness and risk-free economy of agricultural and processing enterprises. Ensuring the economically safe functioning of all industries and spheres of regional agribusiness is impossible without interconnection with science and education. The most important principles necessary for the formation in the regional and national agribusinesses of a developed economically secure market of scientific, technical and innovative products for agroindustrial purposes are the following: providing the scientific and research sphere of the agro-industrial complex with highly qualified personnel; ensuring real freedom and independence in the activities of research institutions; the formation of a common interdependent economic space and interest; organization of specialized market structures in the field of research and innovation development; development and application within the regional agro-industrial complex of a scientifically grounded economic mechanism for regulating the functioning and stimulating the development of the market for scientific and technical innovation products. Purposeful development of the civilized market of scientific, technical and innovative products of agro-industrial design with its corresponding structures and organizational-economic mechanism is an objective necessity of functioning of economic security of the national economy. The interests of the economic and food security of the region and the state as a whole need to increase the financing of the agricultural sector and the processing industry to a level that will overcome the investment and innovation crisis caused by sanctions. To this end, we believe it is necessary to finance the innovative investment agrarian fund at the

  13. ANALYSIS OF FOOD SECURITY STATUS OF FARMING HOUSEHOLDS IN THE FOREST BELT OF THE CENTRAL REGION OF GHANA

    Directory of Open Access Journals (Sweden)

    John K.M. Kuwornu

    2013-01-01

    Full Text Available The study seeks to examine the Food Security Status of Farming Households in the Forest Belt of the Central Region of Ghana. A multistage sampling technique was used to select the respondents that were interviewed. In all 134 farming households were interviewed but 120 were selected for analysis after removing the questionnaires which were not properly administered. The households were selected from eight communities in two districts. Food consumption data of 851 individuals in 120 households were used for the analysis. The study reveals that the majority of the farming households (60% were found to be food insecure. Further, the Binary Logit Model results reveal that an increase in household's income, having access to credit as well as increase in the quantity of own farm production improve the food security status of farming households in the Forest Belt of the Central Region of Ghana. However, holding all other factors constant, increases in non-working member of households worsens the food security status of farming households. Most of the food insecurity coping strategies adopted by household's are not severe and can only be used to avert the impact of food insecurity on a temporal basis. These results have policy implications for Food Security Status of Farming Households in developing countries.

  14. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    Science.gov (United States)

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  15. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  16. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  17. Bilateral agreements

    International Nuclear Information System (INIS)

    1998-01-01

    Ten bilateral agreements are presented. These are: 1) Co-operation agreement relating to the peaceful uses of nuclear energy between Argentina and EURATOM (1996); 2) Agreement on co-operation in the peaceful uses of nuclear energy between Argentina and Greece (1997); 3) Implementing arrangement for technical exchange and co-operation in the area of peaceful uses of nuclear energy between Argentina and the United States (1997); 4) Agreement concerning co-operation in nuclear science and technology between Australia and Indonesia (1997); 5) Implementation of the 1985 Agreement for co-operation concerning the peaceful uses of nuclear energy between the People's Republic of China and the United States (1998); 6) Protocol of co-operation between France and Lithuania (1997); 7) Agreement on co-operation in energy research, science and technology, and development between Germany and the United States (1998); 8) Agreement on early notification of a nuclear accident and exchange of information on nuclear facilities between Greece and Romania (1997); 9) Agreement on early notification of nuclear accidents and co-operation in the field of nuclear safety between Hungary and the Ukraine (1997); 10) Agreement in the field of radioactive waste management between Switzerland and the United States (1997). (K.A.)

  18. Nonproliferation issues. Hearings before the Subcommittee on Arms Control, International Organizations and Security Agreements of the Committee on Foreign Relations, United States Senate, Ninety-Fourth Congress, First and Second Sessions

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    Twelve days of hearings were held over an 18-month period to discuss issues relating to the Nonproliferation Treaty and its effectiveness. Nuclear weapons are no longer confined to those nations with economic and technical capability, a fact which jeopardizes the security of all nations. Critics of the treaty felt that it was more the result of maneuvering than negotiation. The committee examined issues raised by the Vladivostok Accords, which limits the nuclear arms race, promotes detente, and allows progress in arms control. Witnesses responded to criticism that the Accords (1) did not limit a qualitative arms race, (2) allowed both sides to modernize all 2,400 permitted delivery vehicles, (3) did not equalize throw weight, and (4) allow extensive new deployment of MIRV's, especially in the Soviet Union. Witnesses representing government, universities, industry, and foreign countries considered the range of weapons, safeguards and control agreements, estimates of war damage, and the Treaty's intended benefits of security assurance and information exchange

  19. The 21st Century Challenges and the Food-Energy-Water-Security (FEWS) Nexus in the Middle East Region

    Science.gov (United States)

    Moradkhani, H.; Hameed, M.

    2017-12-01

    Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.

  20. The eu-Energy Security and Geopolitical Economy : The Persian Gulf, the Caspian Region and China

    NARCIS (Netherlands)

    Amineh, Mehdi P.; Crijns-Graus, Wina H.J.

    2018-01-01

    Although energy supply security is an important long-term goal of the eu, member states are in control over external supplies and their domestic energy mix, and an overarching institutional structure is lacking. In this paper, we focus on the availability of oil and gas and the risks of supply

  1. The EU-Energy Security and Geopolitical Economy : The Persian Gulf, the Caspian Region and China

    NARCIS (Netherlands)

    Amineh, M.P.; Crijns-Graus, W.H.J.

    2018-01-01

    Although energy supply security is an important long-term goal of the EU, member states are in control over external supplies and their domestic energy mix, and an overarching institutional structure is lacking. In this paper, we focus on the availability of oil and gas and the risks of supply

  2. Mapping the Factors Affecting Household Food Security of Tuberculosis Patients in Coastal Region of Surabaya

    Science.gov (United States)

    Susilaningrum, D.; Ulama, B. S. S.; Lathifah, R.

    2018-04-01

    Food security is a condition of a person who has access to adequate, safe, and nutritious food to meet the needs of a healthy life. Affordability of food is determined by the aggregate purchasing power. It is also can be measured by the amount of poverty in Indonesia which reached 28,07 million in 2014. According to data from the health department, the largest TB cases in Indonesia were in East Java Province and Surabaya accounted for the largest number, there are 48379 cases in 2015. This study mapping the factors that affect household food security of TB patients in the coastal areas of Surabaya. This study used secondary data sources from 11 clinics i.e. TB patient's addres and primary data source to survey patients about food security. Variables used in this study are variables related to socioeconomic factors and sanitary factors. Those variables will be analyzed descriptively and mapping using biplot analysis. Biplot generated based on socio-economic factors, sanitary factors, and status of households in 11 districts Surabaya that near the beach geographically. The result shows that 64% of TB patient households are food insecure than the left are food secure. More than 50% of TB patient households have a good house physically. From the result of mapping between sub-districts and factors, formed five groups consisting of: 1) Benowo and Mulyorejo; 2) Asemrowo, Gunung Anyar, Sukolilo and Pabean Cantikan; 3) Semampir, Krembangan and Bulak; 4) Kenjeran; and 5) Rungkut.

  3. Global Energy Security and Its Geopolitical Impediments: The Case of the Caspian Region

    NARCIS (Netherlands)

    Amineh, M.P.; Houweling, H.

    2007-01-01

    This article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the

  4. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  5. Model, Characterization, and Analysis of Steady-State Security Region in AC/DC Power System with a Large Amount of Renewable Energy

    Directory of Open Access Journals (Sweden)

    Zhong Chen

    2017-08-01

    Full Text Available A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current and the fluctuation of renewable energy have significantly affected the operation and control of a conventional AC system, the definition of the steady-state security region of the AC/DC power system is proposed in this paper based on the AC/DC power flow calculation model including LCC/VSC (Line Commutated Converter/Voltage Sourced Converter-HVDC transmission and various AC/DC constraints, and hence the application of the security region is extended. In order to ensure that the proposed security region can accurately provide global security information of the power system under the fluctuations of renewable energy, this paper presents four methods (i.e., a screening method of effective boundary surfaces, a fitting method of boundary surfaces, a safety judging method, and a calculation method of distances and corrected distance between the steady-state operating point and the effective boundary surfaces based on the relation analysis between the steady-state security region geometry and constraints. Also, the physical meaning and probability analysis of the corrected distance are presented. Finally, a case study is demonstrated to test the feasibility of the proposed methods.

  6. An Approach to Building Capacity for Nuclear Security and Safeguards in Thailand and the Southeast Asian Region

    International Nuclear Information System (INIS)

    Pengvanich, P.; Chanyotha, S.; Nilsuwankosit, S.

    2016-01-01

    Full text: A master’s degree programme in nuclear security and safeguards has been developed and offered at Chulalongkorn University for the first time in 2013 in order to develop necessary human resources in the fields of nuclear security and safeguards who can continue to work, conduct research, or serve as educators in these fields in Thailand and the Southeast Asian region. The first group of 20 students joined the programme in 2013 and recently graduated. The programme was one-of-its-kind, as there have not been many similar specialized programmes in nuclear security and safeguards in the past. In this paper, challenges and lessons learned throughout the programme are reported. Experience from the pilot programme will be used to improve the next round of the programme which is expected to start in 2017. With this program, more nuclear knowledge can be shared and maintained among the Association of South East Asian Nations (ASEAN) countries to ensure the peaceful utilization of nuclear technology in the region. (author

  7. SECURITY RISKS, MYTHS IN A TRANSITIONING SUB-NATIONAL REGIONAL ECONOMY (CROSS RIVER STATE AND IMAGINATIVE GEOGRAPHIES OF NIGERIA

    Directory of Open Access Journals (Sweden)

    J. K. UKWAYI

    2015-03-01

    Full Text Available The emergence of an “international community” through accumulation of perceived risks that contrasts with those risks (of considerably lower levels of seriousness compared to those perceived constitutes one of the interesting (or intriguing subjects of risks and disaster studies surrounding the 9/11 era. The constructions of “imaginative geographies”, have frequently been biased in the practices that underlie the mapping of the foreign places tend to put-down the affected regions in their “paintings” for the global community. The latter are subsequently “demonized” in their ratings of competence for participating in world trade, tourism, travel, among other social/cultural, and economic and political activities. The objective of this article is to highlight how the exaggeration of risks (contrasted to actually existing/lived risks, practices that are frequently associated with such adverse “imaginative geographies” poses sub-national regional development dilemma in Nigeria’s Niger Delta. We trace the roots of adverse “imaginative geographies” of Nigeria to the Abacha dictatorship (1993-1997. Then we highlight the mixed characteristics of the Niger Delta conditions during the “return of positive image recapture” by Nigeria’s federal government (re-democratisation of the Fourth Republic, 1999-present, re-branding campaigns; as well as adverse conditions present. Most significantly, we show that despite these adversities, a combination of favorable geographical size, differentiation, sub-national regional security programme formulation and management taking aims at diversification have created “large oases” of peace and security in Cross River State, a part of the Niger Delta that has been completely unscathed by insurgencies of the nearby sub-national region and further away national origin. Apart from identifying sub-national regions qualifying for delisting from “adverse imaginative geographies” due to

  8. Monitoring the implementation of the State-Regional Council agreement 03/02/2005 as to the management of acute stroke events: a comparison of the Italian regional legislations.

    Science.gov (United States)

    Guidetti, Donata; Spallazzi, Marco; Rota, Eugenia; Morelli, Nicola; Immovilli, Paolo; Toni, Danilo; Baldereschi, Marzia; Di Carlo, Antonio; Polizzi, Bianca M; Ferro, Salvatore; Inzitari, Domenico

    2013-09-01

    Access to effective acute stroke services is a crucial factor to reduce stroke-related death and disability, but is limited in different parts of Italy. Our study addresses this inequality across the Italian regions by examining the regional legislations issued to adopt and implement the State-Regional Council agreement 03/02/2005 as to the acute stroke management. All decrees and resolutions as to acute stroke were collected from each region and examined by the means of a check list including quantitative and qualitative characteristics, selected in accordance with the recommendations from the State-Regional Council document. Each completed check list was then sent to each regional reference person, who filled in the section on the implementation of the indications and compliance, with the collaboration of stroke specialists if necessary. The study was carried out from November 2009 to September 2010. The documents and information were collected from 19 regions. Our survey revealed disparities both in terms of number of decrees and resolutions and of topics covered by the regional legislations about stroke care. Most legislations lacked practical and economical details. This feedback from national and regional stroke regulations revealed a need of more concrete indications. Involvement of various stakeholders (legislators, consumers, providers) might possibly ensure that policies are actually adopted, implemented and maintained. Although considerable challenges are present to the development of standard and optimal stroke care more widely across Italian regions, the potential gains from such developments are substantial.

  9. Regional Cooperation Efforts in the Mekong River Basin: Mitigating river-related security threats and promoting regional development

    Directory of Open Access Journals (Sweden)

    Susanne Schmeier

    2009-01-01

    Full Text Available The development of international rivers is often perceived as leading to conflicts or even water wars. However, as the development of the Mekong River shows, cooperation has not only prevailed in the last decades, but River Basin Organizations (RBOs, established to mitigate river-related conflicts and/or develop the river basin, have also contributed to the emergence of more general cooperation structures, mainly by creating spill-over effects in other issue-areas, bringing cooperation to policy fields beyond the river itself. This article assesses the contribution of the Mekong River Commission (MRC and the Greater Mekong Sub-Region (GMS to the sustainable development of the Mekong Region as well as to the promotion of regional cooperation in mainland South-East Asia in general. --- Die Entwicklung grenzüberschreitender Flüsse wird oft mit Konflikten oder gar Kriegen um Wasser assoziiert. Wie jedoch die Entwicklung im Mekong-Becken zeigt, waren die vergangenen Jahrzehnte nicht nur von Kooperation gezeichnet, sondern Flussbeckenorganisationen konnten außerdem dazu beitragen, weitreichendere Kooperationsstrukturen zu entwickeln, die sich auf andere Politikfelder ausdehnen. Dieser Artikel beschäftigt sich mit dem Beitrag der Mekong River Commission (MRC und der Greater Mekong Sub-Region (GMS zur nachhaltigen Entwicklung in der Mekong Region sowie zur Förderung allgemeiner regionaler Kooperation im Festländischen Südostasien.

  10. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member...... states, European agencies, international partners and the private sector. This article describes the coming about of EC3 and its efforts to address cybercrime. Furthermore, the article is an attempt to assess the growing role of the European law enforcement community on the European security scene...

  11. THE CHINA’S ENERGY SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY

    Directory of Open Access Journals (Sweden)

    Evgeniy Sergeevich Krasantsov

    2013-10-01

    Full Text Available The main objective of this article was to determine the level of the Chinese energy security that was built up for last several decades. In order to reach the set aim the author figured the current condition of the energy sector within the leading states of the Asia-Pacific Region and compared it with a similar condition ofChina. The condition’s characteristics included the following: Chinese energy balance, oil production, import and consumption, energy efficiency, CO2 emissions, electricity amount produced by using the renewable energy sources (hydropower, wind energy, sun energy and nuclear energy. In addition the authorities’ plans for the expansion of the mentioned renewable and nuclear energy production were as well discovered. The probable threats of the energy security and possible obstacles for the extensive means of sustaining the country’s energy security were also brought up.Statistical, comparative and analytical methods were applied in the process of the current research. As a result the PRC was found to be at a threshold to energetic crisis. In order to avoid the scenario two innovative methods were proposed as the means of avoiding the possible future crisis and sustaining energy security.The research results can be applied in determining the domestic and foreign policy of China as well as the foreign policies of the PRC’s energetic partners both within the Asia-Pacific Region and beyond its borders. DOI: http://dx.doi.org/10.12731/2218-7405-2013-7-39

  12. Evaluating the Impact of the Department of Defense Regional Centers for Security Studies

    Science.gov (United States)

    2014-01-01

    Kazakstan, Moldova, Montenegro $542,000 total 11% O&M; 89% other Media: weapon or tool 50 Garmisch, Germany $99,000 O&M nAtO Smart Defense (2...events) 70 total Bosnia, Montenegro $74,000 total Other nESA Yemen national Security Seminar 40 Yemen $450,000 Other pakistani Military Confidence...mandate. It included commentary on all aspects of APCSS’s operations, including physical plant , library usage, stu- dent selection, alumni outreach

  13. Turkey’s New Regional Security Role: Implications for the United States

    Science.gov (United States)

    2014-09-01

    organizational reform, economic restructuring, and integrating recent members. Efforts to develop a Eu- ropean Security and Defense Identity (ESDI...the fed- eral state of Iraq. Turkish officials have also developed ties with moderate Kurdish leaders such as Iraqi Pres- ident Jalal Talabani and...most vis- ible presence is its pop culture, especially cinema , and Turkish goods. Turkish clothes, furniture, toys, build- ing materials, and other

  14. The Impact of the Soviet Military Presence in the Arctic Region on Norwegian Security Policies

    Science.gov (United States)

    1990-01-01

    Admiral Roy Breivik , "Assuring the Security of Reinforcements to Norway", NATO’s Sixteen Nations, Special nr 2, (1982): 67. Former Director General of...34Norway Country Portrait", (1984): 53. 17 Holst, (1982): 27. 18 German, (1982): 61. 19 Bjol, (1983): 25. 20 Breivik , (1982): 68. 21 Interview, Major Kurt...1, (January 1981): 5-7. 137 Vinogradov, N., as translated by Suggs, Robert C., "Let’s Go to Hammerfest", Red Star, (February 1985). Wall, Patrick

  15. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  16. Bilateral agreements

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    The bilateral agreements concern Brazil with United States relative to the co operation in nuclear energy, Germany with Russian Federation relative to the elimination and disposal of nuclear weapons; The multilateral agreements concerns the signature of the Protocols to amend the Paris and Brussels Conventions, the multilateral nuclear environmental programme in the Russian Federation, the status of Conventions in the field of nuclear energy. (N.C.)

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Management Innovations as a Condition of Competitive, Sustainable and Secure Development of the Region

    Directory of Open Access Journals (Sweden)

    Nikolay Prokofyevich Ivanov

    2016-03-01

    Full Text Available In the article within the comparative analysis the author reveals the tendencies of functioning of an economic complex in a number of regions of the South of Russia in recent years; describes the potential of modernization of economy of the Stavropol region; substantiates the influence of organizational and administrative innovations on activity and efficiency of using territorial management of institutes of economic development in practice. The author of the present research proves that realization of administrative capacity of bodies of the regional power of the Stavropol region is mainly connected with the development of production sector of the region, as well as with the monitoring and management of regional economy become the basic elements of creating the diversified, effective and competitive environment focused on creation in the region of the industrial complexes which yield the final products. The article emphasizes that organizational and administrative innovations are mostly directed on the activization of the process of regional innovative system formation, the search of more effective forms of interaction with vertically integrated companies (mega-corporations operating on the territory of the region which investment resources need to be involved in the process of modernization and restructuring of a regional economic complex.

  19. Growing Region Segmentation Software (GRES) for quantitative magnetic resonance imaging of multiple sclerosis: intra- and inter-observer agreement variability: a comparison with manual contouring method

    International Nuclear Information System (INIS)

    Parodi, Roberto C.; Sardanelli, Francesco; Renzetti, Paolo; Rosso, Elisabetta; Losacco, Caterina; Ferrari, Alessandra; Levrero, Fabrizio; Pilot, Alberto; Inglese, Matilde; Mancardi, Giovanni L.

    2002-01-01

    Lesion area measurement in multiple sclerosis (MS) is one of the key points in evaluating the natural history and in monitoring the efficacy of treatments. This study was performed to check the intra- and inter-observer agreement variability of a locally developed Growing Region Segmentation Software (GRES), comparing them to those obtained using manual contouring (MC). From routine 1.5-T MRI study of clinically definite multiple sclerosis patients, 36 lesions seen on proton-density-weighted images (PDWI) and 36 enhancing lesion on Gd-DTPA-BMA-enhanced T1-weighted images (Gd-T1WI) were randomly chosen and were evaluated by three observers. The mean range of lesion size was 9.9-536.0 mm 2 on PDWI and 3.6-57.2 mm 2 on Gd-T1WI. The median intra- and inter-observer agreement were, respectively, 97.1 and 90.0% using GRES on PDWI, 81.0 and 70.0% using MC on PDWI, 88.8 and 80.0% using GRES on Gd-T1WI, and 85.8 and 70.0% using MC on Gd-T1WI. The intra- and inter-observer agreements were significantly greater for GRES compared with MC (P<0.0001 and P=0.0023, respectively) for PDWI, while no difference was found between GRES an MC for Gd-T1WI. The intra-observer variability for GRES was significantly lower on both PDWI (P=0.0001) and Gd-T1WI (P=0.0067), whereas for MC the same result was found only for PDWI (P=0.0147). These data indicate that GRES reduces both the intra- and the inter-observer variability in assessing the area of MS lesions on PDWI and may prove useful in multicentre studies. (orig.)

  20. Political and security issues in the Asia-Pacific region: Assessment of trends

    International Nuclear Information System (INIS)

    Donowaki, Mitsuro

    1992-01-01

    Within the attitude of Japan concerning its policy for peace and stability in the Asia-Pacific region the the need for dialogue and cooperation was underlined specifying the importance of economic cooperation, diplomatic efforts to solve the political problems and the presence of United States in the region. Particular emphasis was put on the relations with China and Russia

  1. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  2. Highway/Railroad Accident Report: Collision Of Northeast Illinois Regional Commuter Railroad Corporation (METRA) Train And Transportation Joint Agreement School District 47/155 School Bus At Railroad/Highway Grade Crossing In Fox River Grove, Illinois, On

    Science.gov (United States)

    1996-10-29

    This report explains the collision of a Northeast Illinois Regional Commuter Railroad Corporation commuter train with a Transportation Joint Agreement School District 47/155 school bus that was stopped at a railroad/highway grade crossing in Fox Rive...

  3. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    The absence of a formidable U.S. and allied Theater Missile Defense (TMD) capability in the East Asian region has encouraged a build-up in offensive missile capability on the part of the People's Republic of China (PRC...

  4. Environmental security of the coastal seafloor in the sea ports and waterways of the Mediterranean region

    Energy Technology Data Exchange (ETDEWEB)

    Obhodas, Jasmina, E-mail: jobhodas@irb.h [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia); Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia); Pavic, Ivica [Ministry of Defense, Croatian Navy, Dubrovacka 49, 21000 Split (Croatia); Kollar, Robert [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)

    2010-07-21

    The Mediterranean coastal seafloor is littered with man-made objects and materials, including a variety of ammunition in many areas. In addition, sediments in ports, harbors and marinas are contaminated with elevated concentrations of chemicals used as biocides in antifouling paints. In order to reach a satisfactory level of environmental security of the coastal sea areas, fast neutron activation analysis with detection of associated alpha particles and energy dispersive X-ray fluorescence, both in laboratory and inside an autonomous underwater vehicle for in-situ measurements, has been used for the characterization of the objects on the seafloor. Measurements have shown that gamma ray spectra are able to distinguish threat material from the surrounding material. Analysis of more than 700 coastal sea sediment samples has resulted in concentration distribution maps indicating the locations of 'hot spots', which might interfere with threat material identification.

  5. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Mahbubani, K.

    1992-01-01

    It is clear that the continued ability of South-East Asia to remain as one of the most peaceful regions of the world hinges upon ASEAN's ability to remain an agile and viable organization, one that is sensitively attuned to the new challenges of the day and is able to rise to meet them. So far, ASEAN's track record has been quite remarkable, especially in comparison with other regions around the world. This Conference could usefully suggest that a greater effort be made to understand the mysterious reasons behind ASEAN's success, in the hope that it may hold lessons for other regions. ASEAN, for its part, must continue to remain humble and adaptable

  6. Economic separatism in the European Union member states as a factor of regional security

    Directory of Open Access Journals (Sweden)

    A A Shakhina

    2014-12-01

    Full Text Available The article is devoted to the examination of the economic separatism problem in the European Union member states. It considers specific of the regional separatist movements as exemplified by the conflicts in Scotland, Catalonia, Bavaria, Flanders. Various points of view on the relevance of the budgetary separatism for the European integration process are given in the article.

  7. Development of Beet Sugar Production in Ryazan Region in the Context of Ensuring Food Security

    Directory of Open Access Journals (Sweden)

    Mansurov Ruslan Evgenyevich

    2014-12-01

    Full Text Available The article presents the results of the research on the current state of the beet sugar subcomplex of Ryazan region in the context of the need of improving its efficiency. The study let the author determine that currently the beet sugar subcomplex of Ryazan region does not ensure domestic demand in sand sugar. However, there are reserves of providing more efficient use of soil and climate capacity as well as the productivity potential of the region. When applying the technology of field beet piling, the period of sugar production at sugar factories may be extended up to 200 days. At this, up to 51 thousand tons of sand sugar can be produced. This amount will completely cover the annual demand for sugar in Ryazan region. In order to further study the feasibility of this approach, zoning was carried out and let allocate the zones of beet seeding. As a result, it was determined that a number of areas are far removed from the place of treatment, and in terms of transportation costs minimization the sugar beet cultivation in these areas is not rational. As an alternative, the author proposes to consider the possibility of building a new sugar factory in Ryazhsky district with the processing capacity of 1,000 tons of sugar beet per day. Taking this into account, the recommended acreage of sugar beet by districts and zones of raw material supply were obtained through corresponding calculations.

  8. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    ...) and the Democratic People's Republic of Korea (DPRK). This build-up has destabilized a region of vital importance to the national interest of the United States by encouraging the idea that offensive military action can be utilized to attain national...

  9. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  10. It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  11. Corrigendum to: It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  12. Meteorological tools in support to the railway security system on the Calabria region

    Science.gov (United States)

    Laviola, Sante; Gabriele, Salvatore; Iovine, Giulio; Baldini, Luca; Chiravalloti, Francesco; Federico, Stefano; Miglietta, Marcello Mario; Milani, Lisa; Procopio, Antonio; Roberto, Nicoletta; Tiesi, Alessandro; Agostino, Mario; Niccoli, Raffaele; Stassi, Sergio; Rago, Valeria

    2017-04-01

    RAMSES (RAilway Meteorological SEcurity System) is a pilot project co-funded by the Italian Railway Company - RFI S.p.A. and conceived for the mitigation of the hydrological risk along the Calabria railways. RAMSES aims at improving the forecast of very short life-cycle convection systems, responsible of intense and localized rainfalls affecting small catchment areas, which are often underestimated by the numerical weather models and even non-adequately detected by the network of sparse raingauges. The RAMSES operational design is based on a synergistic and integrated architecture, providing a series of information able to identify the most active convective cells and monitoring their evolution in terms of vertical structure, rain intensity and geo-hydrological effects at ground (debris flow, landslides, collapses of bridges, erosion of the ballast). The RAMSES meteorological component is designed to identify and track the short-term evolution (15-60 min) of convective cells, by means of imaging techniques based on dual-polarization weather radar and Meteosat data. In support of this quasi-real time analysis, the numerical model WRF provides the weather forecast at 3-6 hours range by ingesting, through the assimilation system LAPS, the observational data (rain gauges, ground weather stations, radar, satellites) in order to improve the initial condition. Finally, the hydraulic flow modeling is used to assess the ground effects in terms of landslide susceptibility, rainfall-runoff intensity, debris impact on the drainage network and evaluate of risk along the railway track.

  13. Regional growth and energy supply: Is there an energy security issue?

    Energy Technology Data Exchange (ETDEWEB)

    Roop, J.M.; Freund, K.A.; Godoy-Kain, P.; Gu, A.Y.; Johnson, A.K.; Paananen, O.H.; Woodruff, M.G.

    1996-12-01

    This study examines how the growth of the developing world might affect energy markets in the future. Based on recent growth trends, world energy demand could reasonably be expected to grow from about 350 Exajoules (EJ: 1.0E18=0.95 Quad) to nearly 1025 EJ by the year 2020, nearly 3x current consumption estimates. Introduction of more energy-efficient technologies could reduce this growth by about 17% to 830 EJ. But one cannot rely exclusively on current trends to forecast future energy demand. The growth of the developing world will interact with supply to affect prices, which in turn will mitigate the growth of demand, and growth rates of energy use will be much more modes. Under the Business as Usual scenario, energy demand will grow to 835 EJ by 2020, and this could be reduced a further 15% to 714 EJ through the adoption of more energy efficient technologies. Fuel prices based on model results are analyzed. Energy security implications of rapid growth in the developing world are considered and found to be of likely little significance.

  14. Spatio-Temporal Simulation and Analysis of Regional Ecological Security Based on Lstm

    Science.gov (United States)

    Gong, C.; Qi, L.; Heming, L.; Karimian, H.; Yuqin, M.

    2017-10-01

    Region is a complicated system, where human, nature and society interact and influence. Quantitative modeling and simulation of ecology in the region are the key to realize the strategy of regional sustainable development. Traditional machine learning methods have made some achievements in the modeling of regional ecosystems, but it is difficult to determine the learning characteristics and to realize spatio-temporal simulation. Deep learning does not need prior identification of training characteristics, have excellent feature learning ability, can improve the accuracy of model prediction, so the use of deep learning model has a significant advantage. Therefore, we use net primary productivity (NPP), atmospheric optical depth (AOD), moderate-resolution imaging spectrometer (MODIS), Normalized Difference Vegetation Index (NDVI), landcover and population data, and use LSTM to do spatio-temporal simulation. We conduct spatial analysis and driving force analysis. The conclusions are as follows: the ecological deficit of northwestern Henan and urban communities such as Zhengzhou is higher. The reason of former lies in the weak land productivity of the Loess Plateau, the irrational crop cultivation mode. The latter lies in the high consumption of resources in the large urban agglomeration; The positive trend of Henan ecological development from 2013 is mainly due to the effective environmental protection policy in the 12th five-year plan; The main driver of the sustained ecological deficit growth of Henan in 2004-2013 is high-speed urbanization, increasing population and goods consumption. This article provides relevant basic scientific support and reference for the regional ecological scientific management and construction.

  15. SPATIO-TEMPORAL SIMULATION AND ANALYSIS OF REGIONAL ECOLOGICAL SECURITY BASED ON LSTM

    Directory of Open Access Journals (Sweden)

    C. Gong

    2017-10-01

    Full Text Available Region is a complicated system, where human, nature and society interact and influence. Quantitative modeling and simulation of ecology in the region are the key to realize the strategy of regional sustainable development. Traditional machine learning methods have made some achievements in the modeling of regional ecosystems, but it is difficult to determine the learning characteristics and to realize spatio-temporal simulation. Deep learning does not need prior identification of training characteristics, have excellent feature learning ability, can improve the accuracy of model prediction, so the use of deep learning model has a significant advantage. Therefore, we use net primary productivity (NPP, atmospheric optical depth (AOD, moderate-resolution imaging spectrometer (MODIS, Normalized Difference Vegetation Index (NDVI, landcover and population data, and use LSTM to do spatio-temporal simulation. We conduct spatial analysis and driving force analysis. The conclusions are as follows: the ecological deficit of northwestern Henan and urban communities such as Zhengzhou is higher. The reason of former lies in the weak land productivity of the Loess Plateau, the irrational crop cultivation mode. The latter lies in the high consumption of resources in the large urban agglomeration; The positive trend of Henan ecological development from 2013 is mainly due to the effective environmental protection policy in the 12th five-year plan; The main driver of the sustained ecological deficit growth of Henan in 2004-2013 is high-speed urbanization, increasing population and goods consumption. This article provides relevant basic scientific support and reference for the regional ecological scientific management and construction.

  16. Assessing food security in water scarce regions by Life Cycle Analysis: a case study in the Gaza strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni

    2013-04-01

    Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).

  17. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  18. Regionalizing East Mediterranean Gas: Energy Security, Stability, and the U.S. Role

    Science.gov (United States)

    2014-12-01

    Lebanon to supply LNG to Europe, Latin America , or even Asia appears politically attrac- tive both on a domestic and regional level. LNG mar- kets such...exploration costs and low oil prices, but the reality includes probably poor seismic data and high resultant investment risk , coupled with ex...EL-KATIRI is a Director of MENA In- sight, a political risk consultancy that focuses on the Middle East and North Africa, and a Senior Research

  19. Geo-Regional Security and Transformation After the Balkan's Wars and Kosova Independence

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Gjon Boriqi

    2014-02-01

    Full Text Available During the '90-ies the wars in the former territories of what was called Yugoslavia marked the end of a century plenty of wars and local armed conflicts. More than 140 million people died because of wars in the XX century. The war of Kosova was the last one in that century. The beginning of the XXI century stressed the necessity for a new way of thinking nationally, regionally and globally. The Balkans were often considered as a gun powder territory. All the Balkans states, someone more and someone less, have problems with each other. History was and remained very passionate within the Balkan countries. The case of Kosova is possibly the most sensitive in all this framework. After the proclamation of independence on February 17 2008, the concerns were high within the region and a new question was questioned: would the map of the Balkan peninsula change again to form another "Kosovo"? This article would give some details about the geopolitical situation in the Balkans focusing on Kosova and would try to establish e new way of making politics and diplomacy though deterrence and not offence. We will try to overpass history but without neglecting it, but by learning from its mistakes in order to bring a better Peace-Building aspect for the Balkan region.

  20. Seismic security assessment of earth and rockfill dams located in epicentral regions

    Energy Technology Data Exchange (ETDEWEB)

    Oldecop, L.; Zabala, F.; Rodari, R. [San Juan National Univ., San Juan (Argentina). Instituto de Invest. Antisismicas

    2004-07-01

    The seismic safety of dams is of great interest to the midwest region of Argentina, the most seismically active area in the country. This paper examines factors controlling the design of dams subjected to earthquake action, criteria for safety verification and the analysis tools currently available. Data of dams, active faults and epicenters of historic earthquakes in the region were provided. Paleoseismicity research was suggested as an important area of research, potentially enhancing an understanding of a region's seismic activity. It was concluded that analysis tools currently used in engineering include simple models offering advantages in reliability and ease of result interpretation, but have shortcomings in their applicability. Care must be taken in the validation and interpretation of these models, particularly when the behaviour of a dam includes complex phenomena. More sophisticated analysis tools currently available are difficult to apply, largely due to the complexity of algorithms in the models. It was also concluded that in order to overcome difficulties in both simple and complex models, predictions should be contrasted with real behaviour data. Data from measurement of seismic behaviour is still relatively scarce, presenting an obstacle towards the further use of more sophisticated analysis tools, as they are not as yet tested against measurements and observations of real cases. 15 refs., 2 tabs., 11 figs.

  1. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  2. Efforts to promote regional security dialogue and cooperation in the North Pacific

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Indifference to the new realities of the post-cold war era does nothing to preserve the traditional priorities laid down in the Final Document of the first special session on disarmament. On the contrary, such attitudes directly contribute to the trend towards marginalization which began when publics no longer feared the threat of a nuclear holocaust. It is believed that the expertise of forty years of multilateral arms control and disarmament efforts is directly relevant to the broader efforts of the international community to restore, maintain and promote international peace and security. Who can deny that confidence-building is central to preventive diplomacy? Or that the arms control component-from disarming to demobilization-is not equally central to peace operations whether they be traditional peace-keeping or post-conflict peace-building? Indeed the success or failure of the disarmament aspect of a peace operation is often critical to its overall success-Somalia surely being one recent sad example. The multilateral disarmament community must apply itself more directly and systematically to these broader problems - just as the United Nations Secretariat has increasingly begun to do - or risk indifference from Governments forced to make tough choices against a range of competing priorities. It is undeniably true that the post-cold war has significantly increased the potential for the international community to negotiate historic new multilateral disarmament treaties. And this window of opportunity must be utilized to the fullest. At the same time, due account must be taken of the hard fact that, for an increasing number of countries, expensive obligations in relation to advanced unconventional weapons which neither they nor their neighbours seek to possess may count for less than practical assistance in finding solutions to more parochial, but no less urgent, problems

  3. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  4. Results of a project on development of agro-forestry systems for food security in Carrefour region, Republic of Haiti

    Directory of Open Access Journals (Sweden)

    Furio Massolino

    2011-11-01

    Full Text Available Haity has a notable problem of food security, 48% of people have not sufficient food availability, food prices has doubled from 1980 and 1990 and further increased 5 times between 1991 and 2000. Water availability and quality is another problems to be added to food insufficiency. Food deficiency is mitigated by natural food resources in rural areas where many different species are cultivated together but it can be extreme in the towns. Agricultural systems are not efficient and, at the same time, enhance soil and genetic erosion. A development project has been implemented to increase food security over the long term in the geographical area of Carrefour rural area, this comprises a research aimed to increase national food production introducing complex agro-forestry systems. The project has investigated problems and solutions, actions have been started to increase food production, including agronomic training of local farmers, organization of small farmers including legal protection on land tenure, introduction of low input modern agroforestry systems that can diversify food production through the year and reduce soil and genetic erosion. After these results, an intervention project has been approved and funded by EU, then delayed due to the recent civil war, finally it is giving positive results now. The same approach used for this project can be spread in the rest of the Republic of Haiti and, hopefully, to other world regions that have similar problems.

  5. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  6. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  7. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1999-01-01

    The document presents the status of acceptances as of 16 March 1999 of the extension of the African Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) which entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000. There are 25 States which notified the acceptance of the Agreement extension

  8. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-23

    The document presents the status of acceptances as of 6 October 1999 of the extension of the African Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) which entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000. There are 26 States which notified the acceptance of the Agreement extension.

  9. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-04-19

    The document presents the status of acceptances as of 16 March 1999 of the extension of the African Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) which entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000. There are 25 States which notified the acceptance of the Agreement extension

  10. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA). Status of acceptances as of 30 September 1995

    International Nuclear Information System (INIS)

    1995-10-01

    As of 30 September 1995, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), has been received by the Director General from the Governments of: Tunisia, Egypt, Madagascar, South Africa, Ethiopia, Algeria, Mauritius, Sudan, Tanzania, Cameroon, Kenya, Zaire, Morocco, Sierra Leone, Namibia, Nigeria, Ghana. Pursuant to Article XIV.2, (of the original Agreement) the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  11. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA). Status of acceptances as of 30 September 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    As of 30 September 1995, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), has been received by the Director General from the Governments of: Tunisia, Egypt, Madagascar, South Africa, Ethiopia, Algeria, Mauritius, Sudan, Tanzania, Cameroon, Kenya, Zaire, Morocco, Sierra Leone, Namibia, Nigeria, Ghana. Pursuant to Article XIV.2, (of the original Agreement) the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  12. Water Security, Climate Forcings and Public Health Impacts in Emerging Regions

    Science.gov (United States)

    Serman, E. A.; Akanda, A. S.; Craver, V.; Boving, T. B.

    2014-12-01

    Our world is rapidly urbanizing, with more than 80% of world's population is expected to be living in a city by the end of the century. A majority of these nations are rapidly urbanizing due to massive rural-to-urban migratory trends, with rapid development of unplanned urban settlements, or slums, with lack of adequate water or sanitation facilities and other municipal amenities. With global environmental change, natural disasters will expose millions more to drought, floods, and disease epidemics, and existing vulnerabilities will worsen. At the same time, rapid urbanization and fast changing land-use leads to widespread damage of infrastructure by stormwater, especially in lowlands and economically poor areas. The factor that consistently stands out among different cities from both the developed and the developing worlds is that the slums are typically the most vulnerable to water related natural hazards and climatic threats, such as water scarcity and quality issues in drought conditions, or water and sanitation breakdown and stormwater contamination problems. Onsite or decentralized water, wastewater and stormwater treatment as well as point-of-use water treatment options can be an economic, safe, and reliable alternative to conventional large-scale treatment especially, in urban fringes as well as rural areas. These systems can be designed to fit communities in terms of their economic, cultural, environmental, and demographic resources. As part of this study, we develop a database of urban water quality and quantity indices such as with urban land-use, water usage, climate, and socio-economic characteristics in various emerging regions in the world. We analyze past and current data to identify and quantify long-term trends and the impacts of large-scale climatic and anthropogenic changes on urban hydrology and health impacts. We specifically focus on five major cities from distinct groups of countries and geographies: Providence, RI, USA from the developed

  13. Triple Helix Model as an Efficient Mechanism of Food Security Provision in Regional Economic Entities and the Economic System as a Whole

    Directory of Open Access Journals (Sweden)

    Mihail N. Dudin

    2014-08-01

    Full Text Available The leading countries of the world consider food security the important condition of internal political and social-economic stability of the state and its external independence. The topic of the article is crucial due to the fact that the problem of food security is rather complicated and multilevel and should be considered at different interrelated hierarchical levels. In this context the efficient model of food security is the result of the permanent dialogue between the representatives of the state government, business entities, social organizations and scientific institutions. The article justifies the fact that the model of innovation development, known as ‘the triple helix model’ should be applied at the modern stage of economic development as an efficient tool for the food security provision, which can be implemented in the activity of regional economic entities and the whole economic system of the Russian Federation.

  14. Multilateral agreements

    International Nuclear Information System (INIS)

    Anon.

    2012-01-01

    I. Status of conventions in the field of nuclear energy as of December 2012: Non-proliferation and nuclear security (Treaty on the Non-Proliferation of Nuclear Weapons, Convention on the Physical Protection of Nuclear Material, Amendment to the Convention on the Physical Protection of Nuclear Material, International Convention for the Suppression of Acts of Nuclear Terrorism, Comprehensive Nuclear-Test-Ban Treaty); Nuclear safety and emergency response (Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Early Notification of a Nuclear Accident, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management); Liability and compensation for nuclear damage (Paris Convention on Nuclear Third Party Liability, Brussels Supplementary Convention on Third Party Liability in the Field of Nuclear Energy, Protocol to Amend the Paris Convention on Nuclear Third Party Liability, Protocol to Amend the Brussels Convention Supplementary to the Paris Convention, Vienna Convention on Civil Liability for Nuclear Damage, Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage, Joint Protocol relating to the Application of the Vienna Convention and the Paris Convention, Convention on Supplementary Compensation for Nuclear Damage). II. Status of conventions in the field of environmental protection/assessment which affect nuclear energy use as of December 2012: Convention on Access to Information, Public Participation in Decision-making and Access to Justice in Environmental Matters (Aarhus Convention), Convention on Environmental Impact Assessment in a Transboundary Context (Espoo Convention), Protocol on Strategic Environmental Assessment (Kiev Protocol), Convention for the Protection of the Marine Environment of the North-East Atlantic (OSPAR). III. OECD member country participation in the nuclear energy treaties/conventions and in the

  15. Report on Symposium on Pacific Energy Cooperation 2001. Energy Security in Asian Region; Taiheiyo energy kyoryoku kaigi 2001 hokokusho. Asia chiiki no energy anzen hosho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-02-20

    The Symposium on Pacific Energy Cooperation (SPEC), which started in 1986 to discuss energy problems and international cooperation on energy in the Pacific region, met for 2001 in Tokyo on February 20 and 21, 2001, to discuss Energy Security in Asian Region. The conference comprised two keynote addresses, four sessions, and a panel discussion. Twenty-four countries and an international organization were represented by a total of 785 participants who actively exchanged views and opinions. With Director Tsutomu Toichi, The Institute of Energy Economics, Japan, acting as chairman, two keynote addresses were delivered. Minister of Oil Bijan Namdar Zanganeh of Iran reported on The Role of I. R. Iran in Meeting the Growing Oil and Gas Demand in the Asia-Pacific Region and Potential Cooperation with the Region's Consumers. Managing Director Phil Watts of the Royal Dutch/Shell Group reported on Security in Trust - Meeting Asian Energy Needs in the 21st Century. (NEDO)

  16. Multilateral agreements

    International Nuclear Information System (INIS)

    2013-01-01

    I. Status of treaties and conventions in the field of nuclear energy as of November 2013: Non-proliferation and nuclear security (Treaty on the Non-Proliferation of Nuclear Weapons, Convention on the Physical Protection of Nuclear Material, Amendment to the Convention on the Physical Protection of Nuclear Material, International Convention for the Suppression of Acts of Nuclear Terrorism, Comprehensive Nuclear-Test-Ban Treaty); Nuclear safety and emergency response (Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Early Notification of a Nuclear Accident, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management); Liability and compensation for nuclear damage (Paris Convention on Nuclear Third Party Liability, Brussels Supplementary Convention on Third Party Liability in the Field of Nuclear Energy, Protocol to Amend the Paris Convention on Nuclear Third Party Liability, Protocol to Amend the Brussels Convention Supplementary to the Paris Convention, Vienna Convention on Civil Liability for Nuclear Damage, Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage, Joint Protocol relating to the Application of the Vienna Convention and the Paris Convention); Convention on Supplementary Compensation for Nuclear Damage; II. Status of conventions in the field of environmental protection/assessment which affect nuclear energy use as of December 2011: Convention on Access to Information, Public Participation in Decision-making and Access to Justice in Environmental Matters - Aarhus Convention (Convention on Environmental Impact Assessment in a Transboundary Context (Espoo Convention), Protocol on Strategic Environmental Assessment to the Espoo Convention (Kiev Protocol), Convention for the Protection of the Marine Environment of the North-East Atlantic (OSPAR)); III. Participation in the nuclear energy treaties

  17. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1998-01-01

    The document presents the status of acceptances as of 21 September 1998 of the extension of the African Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) which entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  18. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-13

    The document presents the status of acceptances as of 21 September 1998 of the extension of the African Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) which entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  19. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  20. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  1. Developing an analytical model to increase urban security from the Secured perspective by Designing (SBD) Approach using fuzzy AHP method (case study: region 17 of Tehran)

    OpenAIRE

    H. Zabihi; T. Larimian; H. Poorani

    2013-01-01

    Extended abstract1-IntroductionSafety and security have been significant issues throughout history, from early prehistoric cave-dwelling societies to medieval and modern cities (P. Cozens, 2008). Crime is a part of our way of living. It is tied to the physical distribution of people and objects, to the routine activity patterns of daily life, and to the ways in which people perceive and use information about the environment (Brantingham & Brantingham, 1993). Statistics show that there is a me...

  2. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  3. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA). Status of Acceptances as of 30 July 1998

    International Nuclear Information System (INIS)

    1998-01-01

    As of 30 July 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 23 African States. Senegal is added to the list of 22 States reported in the previous edition (add.10) of this document. The extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  4. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA). Status of Acceptances as of 30 July 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-08-13

    As of 30 July 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 23 African States. Senegal is added to the list of 22 States reported in the previous edition (add.10) of this document. The extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  5. Transpacific Partnership (TPP Agreement. Is the commercial solution for political-military tension at the region? or Is an american strategy to diminish China influence in Asia?

    Directory of Open Access Journals (Sweden)

    Eduardo Ramírez Zamudio

    2015-07-01

    several subjects, but they are members of one of the wealthiest regions in the world: Asia-Pacific and both of them attend the Asia- Pacific Economic Cooperation Forum (APEC, which main goal is to establish a Free Trade Area for the 21 member economies by 2020. Unfortunately, Apec’s goal has been delayed by the lack of consensus among its members. Since 2011, the United States and other Apec Apec’s members have openly supported The Transpacific Partnership Agreement (TPP, which could be a brilliant strategy to boost the members’ economic growth through their commercial linkage in Asia-Pacific. However, the fact that China has not been invited by the U.S. to TPP poses the question of whether this strategy has intentions beyond its economic interests and seeks to diminish China’s economic political influence in Asia. If the American administration intends to exclude China from this ambitious economic integration, the Tpp’s potential will never be reached.

  6. 8 CFR 217.6 - Carrier agreements.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Carrier agreements. 217.6 Section 217.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS VISA WAIVER PROGRAM § 217... may notify a carrier of the existence of a basis for termination of a carrier agreement under this...

  7. Cashew cultivation, access to land and food security in Brong-Ahafo Region, Ghana:\\ud Preventing the intergenerational transmission of poverty

    OpenAIRE

    Evans, Ruth; Mariwah, Simon; Barima Antwi, Kwabena

    2014-01-01

    This research aimed to investigate the implications of changing agricultural land use from food production towards increased cashew cultivation for food security and poverty alleviation in Jaman North District, Brong-Ahafo Region of Ghana. Based on qualitative, participatory research with a total of 60 participants, the research found that increased cashew production had led to improvements in living standards for many farmers and their children over recent years. Global demand for cashew is ...

  8. Climate-derived tensions in Arctic security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  9. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  10. 76 FR 65365 - United States-OMAN Free Trade Agreement

    Science.gov (United States)

    2011-10-21

    ... Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... other customs-related provisions of the United States--Oman Free Trade Agreement entered into by the... the U.S.-Oman Free Trade Agreement (``OFTA'' or ``Agreement''). The provisions of the OFTA were...

  11. 78 FR 32356 - United States-Korea Free Trade Agreement

    Science.gov (United States)

    2013-05-30

    ...-Korea Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... treatment and other customs-related provisions of the United States-Korea Free Trade Agreement entered into...-Korea Free Trade Agreement (hereinafter ``UKFTA'' or the ``Agreement''). On December 3, 2010, the United...

  12. Communication dated 10 September 2008 received from the Permanent Mission of Egypt to the Agency concerning the High Level Policy Review Seminar of African Regional Cooperative Agreement for Research, Development and Training related to Nuclear Science and Technology (AFRA)

    International Nuclear Information System (INIS)

    2008-01-01

    The Secretariat has received a communication dated 10 September 2008 from the Permanent Mission of Egypt enclosing the documents of the High Level Policy Review Seminar of the African Regional Cooperative Agreement for Research, Development and Training related to Nuclear Science and Technology (AFRA) held in Aswan, Egypt on 28-29 November 2007. The communication, and as requested therein, the enclosures containing the Declaration of Aswan, the Aswan Action Plan and the Profile of the Regional Strategic Cooperative Framework (2008-2013) are circulated herewith for information

  13. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  14. Voluntary agreements in environmental policy

    International Nuclear Information System (INIS)

    Torvanger, Asbjoern

    2001-01-01

    A typically voluntary agreement is signed between the authorities and an industrial sector in order to reduce the emission of environmentally harmful substances. There are many different types of agreements. Voluntary agreements are not strictly voluntary, since in the background there is often some kind of ''threat'' about taxation or fees if the industry is unwilling to cooperate. This type of agreements has become popular in many OECD countries during the last decades. In Norway there are only a few agreements of this type. Experience with the use of voluntary agreements as well as research show that they are less cost-effective than market-based instruments such as taxes and quota systems. If there are great restrictions on the use of taxes and quota systems because of information- or measurement problems, or because these instruments are not politically acceptable, then voluntary agreements may be an interesting alternative. Thus, voluntary agreements are best used as a supplement to other instruments in some niche areas of the environmental policy. In some cases, voluntary agreements may be used between two countries or at a regional level, for example within the EU

  15. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  16. How Do Environmental Issues Contribute to Regional Instability? and Which Regions Will Pose the Greatest Threat to U.S. Security as a Result of Environmental Degredation?

    National Research Council Canada - National Science Library

    Schantz, Blair

    1998-01-01

    .... The primary objective of this research is to determine and define how environmental issues contribute to regional political, economic or physical instability and then apply this definition to the regions of the world...

  17. Mali and Nigeria Should be Established as Key Regional Partners of the United States to Further Mutual Interests for Ensuring Long-Term Security and Stability in the Sahel Region

    Science.gov (United States)

    2016-06-10

    natural resources and markets through the IMF and World Bank’s Structural Adjustment Programs ( SAPs ) during the 1980s. As a result, the security...development- indicators&Type=TABLE&preview=on#. On the macroeconomics spectrum, an economic dependency, poor human resources , and lack of... resources became involved in the region but now find it necessary to protect their interests and homelands from a variety of hybrid threats

  18. Analysis of Water Resources Supply and Demand and Security of Water Resources Development in Irrigation Regions of the Middle Reaches of the Heihe River Basin, Northwest China

    Institute of Scientific and Technical Information of China (English)

    JI Xi-bin; KANG Er-si; CHEN Ren-sheng; ZHAO Wen-zhi; XIAO Sheng-chun; JIN Bo-wen

    2006-01-01

    Based on the data for meteorology, hydrology, soil, planting, vegetation, and socio-economic development of the irrigation region in the middle reaches of the Heihe River basin, Northwest China, the model of balance of water supply and demand in the region was established, and the security of water resource was assessed, from which the results that the effects of unified management of water resources in the Heihe River basin between Gansu Province and Inner Mongolia on regional hydrology are significant with a decrease in water supply diverted from Heihe River and an increase in groundwater extracted. In addition, it was found that the groundwater level has been steadily decreasing due to over pumping and decrease in recharges. In present year (2003), the volume of potential groundwater in the irrigation districts is far small because of the groundwater overdraft; even in the particular regions, there is no availability of groundwater resources for use. By 2003, water supply is not sufficient to meet the water demand in the different irrigation districts, the sustainable development and utilization of water resources are not secured, and the water supply crisis occurs in Pingchuan irrigation district. Achieving water security for the sustainable development of society, agriculture, economy, industry, and livelihoods while maintaining or improving the abilities of the management and planning of water resources, determining of the reasonable percentage between water supply and groundwater utilization and water saving in agricultural irrigation are taken into account. If this does not occur, it is feared that the present performance of water development and planning may further aggravate the problem of scarcities of water resources and further damage the fragile ecological system.

  19. Federal Facility Agreement progress report

    Energy Technology Data Exchange (ETDEWEB)

    1993-10-01

    The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas.

  20. Federal Facility Agreement progress report

    International Nuclear Information System (INIS)

    1993-10-01

    The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas

  1. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  2. 40 CFR 35.3010 - Delegation agreement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Delegation agreement. 35.3010 Section... STATE AND LOCAL ASSISTANCE Construction Grants Program Delegation to States § 35.3010 Delegation agreement. (a) Before execution of the delegation agreement, the Regional Administrator must determine that...

  3. 75 FR 14159 - Notice of Agreements Filed

    Science.gov (United States)

    2010-03-24

    ... parties to exchange slots in the trade between U.S. East Coast ports and ports in Turkey. Agreement No.: 201048-005. Title: Lease and Operating Agreement between Philadelphia Regional Port Authority and... FEDERAL MARITIME COMMISSION Notice of Agreements Filed The Commission hereby gives notice of the...

  4. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    Næss, Tom

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  5. U.S. Security Strategy in the Asia-Pacific: Partnering With Asean to Maintain Stability Within the Region

    Science.gov (United States)

    Association of Southeast Asian Nations (ASEAN) can serve as a mechanism to strengthen U.S. partnerships in the region while sustaining stability and maintaining the economic growth of the region.... economically in the last few decades. The U.S. has developed key partnerships and alliances in the region and has an obligation to assist its partners in...ensuring that any threats to the social and environmental stability are managed in accordance with the rules of law. The U.S. relies on the region for

  6. AgriSense-STARS: Advancing Methods of Agricultural Monitoring for Food Security in Smallholder Regions - the Case for Tanzania

    Science.gov (United States)

    Dempewolf, J.; Becker-Reshef, I.; Nakalembe, C. L.; Tumbo, S.; Maurice, S.; Mbilinyi, B.; Ntikha, O.; Hansen, M.; Justice, C. J.; Adusei, B.; Kongo, V.

    2015-12-01

    In-season monitoring of crop conditions provides critical information for agricultural policy and decision making and most importantly for food security planning and management. Nationwide agricultural monitoring in countries dominated by smallholder farming systems, generally relies on extensive networks of field data collectors. In Tanzania, extension agents make up this network and report on conditions across the country, approaching a "near-census". Data is collected on paper which is resource and time intensive, as well as prone to errors. Data quality is ambiguous and there is a general lack of clear and functional feedback loops between farmers, extension agents, analysts and decision makers. Moreover, the data are not spatially explicit, limiting the usefulness for analysis and quality of policy outcomes. Despite significant advances in remote sensing and information communication technologies (ICT) for monitoring agriculture, the full potential of these new tools is yet to be realized in Tanzania. Their use is constrained by the lack of resources, skills and infrastructure to access and process these data. The use of ICT technologies for data collection, processing and analysis is equally limited. The AgriSense-STARS project is developing and testing a system for national-scale in-season monitoring of smallholder agriculture using a combination of three main tools, 1) GLAM-East Africa, an automated MODIS satellite image processing system, 2) field data collection using GeoODK and unmanned aerial vehicles (UAVs), and 3) the Tanzania Crop Monitor, a collaborative online portal for data management and reporting. These tools are developed and applied in Tanzania through the National Food Security Division of the Ministry of Agriculture, Food Security and Cooperatives (MAFC) within a statistically representative sampling framework (area frame) that ensures data quality, representability and resource efficiency.

  7. Technology Partnership Agreements | NREL

    Science.gov (United States)

    Partnership Agreements Technology Partnership Agreements Looking for Funding? We do not fund any projects under a technology partnership agreement. The partner provides the necessary resources and, in using technology partnership agreements. See a summary of our Fiscal Year 2017 technology partnership

  8. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  9. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  10. A History of the International Agreement on Iran's Nuclear Program

    International Nuclear Information System (INIS)

    Fabius, Laurent

    2016-01-01

    In May 2012, in the aftermath of the French presidential election, Iranian nuclear program posed a major challenge concerning both regional security questions and global efforts to prevent nuclear proliferation. The situation was characterized by a diplomatic stalemate, sanctions and the concerning development of Iran's nuclear program. Many fear that Iran's current program development will warrant military intervention in an effort to prevent further success. France therefore decided to implement a policy of 'constructive firmness' in the hope of reaching a robust and verifiable agreement that shows real progress in the international effort to prevent Iran from acquiring nuclear weapons. The following text is an accurate account of the process leading up to this major agreement by one of its main actors

  11. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    Science.gov (United States)

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due

  12. Regional transportation operations collaboration and coordination : a primer for working together to improve transportation safety, reliability, and security

    Science.gov (United States)

    2002-01-01

    This primer was written for transportation professionals and public safety officials from cities, counties, and States who are responsible for day-to-day management and operations within a metropolitan region. It is intended to help agencies and orga...

  13. 78 FR 60191 - United States-Colombia Trade Promotion Agreement

    Science.gov (United States)

    2013-10-01

    ... Trade Promotion Agreement AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States- Colombia Trade Promotion... States-Colombia Trade Promotion Agreement (``CTPA'' or ``Agreement''), and on June 28, 2007, the Parties...

  14. 77 FR 64031 - United States-Peru Trade Promotion Agreement

    Science.gov (United States)

    2012-10-18

    ... Trade Promotion Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States-Peru Trade Promotion Agreement... other customs-related provisions of the United States-Peru Trade Promotion Agreement (PTPA). Please...

  15. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  16. Nuclear cooperation agreements

    International Nuclear Information System (INIS)

    Nuclear cooperation agreements are reviewed in tabular form, especially agreements with developing countries. The reporting countries are the USA, the Federal Republic of Germany, Canada, Australia, Japan, and France. A separate EURATOM list is annexed

  17. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  18. Analysis and characterization of security regions in power systems. Part I. Load flow feasibility conditions in power networks

    Energy Technology Data Exchange (ETDEWEB)

    Jarjis, J; Galiana, F D

    1980-03-01

    A set theoretic analysis of loadflow feasibility of a general power network with arbitrary PQ, PV and slack buses is presented. Load-flow feasibility is that property of a power network defining the theoretical limitations on the bus injections under which a steady state equilibrium exists. The set theoretic analysis is based on the study of the conical loadflow feasibility region. This region is characterised by a set of supporting hyperplanes each of which defines an explicit necessary condition for loadflow feasibility on the bus injections. A quantitative measure of loadflow feasibility for an arbitrary given operating injection vector is defined through a computable scalar stability margin. This stability margin permits the loadflow feasibility of different injections and network structures to be quantitatively compared and analysed.

  19. Shareholders' agreements in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2010-01-01

    ’ agreements”) cannot bind the company within the sense of company law under the new state of law, and voting rights agreements, agreements on right of pre-emption etc. will therefore only apply at the level of contract law between the parties to the agreement. This article for European Business Law Review......The article warns that with effect from 1 March 2010, the new Danish Companies Act (on public and private limited companies) has seriously weakened the effect of shareholders’ agreements which have been entered into on Danish companies. These agreements (in the act’s new terminology: “owners...... analyses the consequences of this. Rights and duties in the owners’ agreements must now be reiterated to the greatest possible extent in the company’s articles of association so that the precepts become binding on the company and its management. Whether the parties to the owners’ agreement can be required...

  20. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  1. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  2. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations; Texto de un Acuerdo de Cooperacion Regional Para la Investigacion, el Desarrollo y la Capacitacion en Materia de Ciencias y Tecnologia Nucleares

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1972-08-18

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [Spanish] Para conocimiento de todos los Estados Miembros en el presente documento se transcribe el texto de un Acuerdo de Cooperacion Regional para la investigacion, el desarrollo y la capacitacion en materia de ciencias y tecnologia nucleares entre el Organismo y los Estados Miembros. En la Seccion 9 se especifican los Estados Miembros que pueden ser partes en el Acuerdo.

  3. Technical cooperation for the pacific uses of nuclear technology in Latin America and Caribbean: the experience of regional agreement ARCAL; Cooperacao tecnica para os usos pacificos da tecnologia nuclear na America Latina e no Caribe: a experiencia do acordo regional ARCAL

    Energy Technology Data Exchange (ETDEWEB)

    Rondinelli Junior, Francisco

    2017-11-01

    This thesis studies the international technical cooperation in the field of peaceful applications of the nuclear technology, focusing on the experience of Latin American countries, where the Cooperation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean, also known as ARCAL, is in force. The study adopts as theoretical approach the concept of state capacities, particularly with regard to the institutional capacities applicable to the ARCAL Agreement. Within this approach, three dimensions of analysis are adopted: the institutional dimension, the governance dimension and the focus on outcomes. The evaluation of the ARCAL Agreement is carried out in order to confirm if the intended role to promote regional technical cooperation in the nuclear sector is being implemented. The methodological approach adopted the case study model. It starts with the analysis of the institutional evolution of the Agreement, and identifies variables articulating with the three dimensions above mentioned. The empirical data were collected in two stages. In the first stage it were performed 29 interviews carried out by the author with the technical and staff members of the Department of Technical Cooperation of IAEA, in Vienna, Austria, headquarter of IAEA. The other stage involved an electronic questionnaire submitted to the national coordinator of ARCAL in 14 countries, in a universe of 21 member states. The conclusion of the research points to the fact that the ARCAL Agreement has incorporated, throughout its trajectory, elements of the institutional capacities which are still in the process of development. They give to the Agreement the potential to induce the development of the state capacities of the respective countries in the field of peaceful applications of nuclear technology. (author)

  4. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  5. An Agro-Climatological Early Warning Tool Based on the Google Earth Engine to Support Regional Food Security Analysis

    Science.gov (United States)

    Landsfeld, M. F.; Daudert, B.; Friedrichs, M.; Morton, C.; Hegewisch, K.; Husak, G. J.; Funk, C. C.; Peterson, P.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.; Williams, E. L.

    2015-12-01

    The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The Google Earth Engine (GEE) is a platform provided by Google Inc. to support scientific research and analysis of environmental data in their cloud environment. The intent is to allow scientists and independent researchers to mine massive collections of environmental data and leverage Google's vast computational resources to detect changes and monitor the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). The CHIRPS dataset is land based, quasi-global (latitude 50N-50S), 0.05 degree resolution, and has a relatively long term period of record (1981-present). CHIRPS is on a continuous monthly feed into the GEE as new data fields are generated each month. This precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. FEWS NET intends to leverage the GEE in order to provide analysts and scientists with flexible, interactive tools to aid in their monitoring and research efforts. These scientists often work in bandwidth limited regions, so lightweight Internet tools and services that bypass the need for downloading massive datasets to analyze them, are preferred for their work. The GEE provides just this type of service. We present a tool designed specifically for FEWS NET scientists to be utilized interactively for investigating and monitoring for agro-climatological issues. We are able to utilize the enormous GEE computing power to generate on-the-fly statistics to calculate precipitation anomalies, z-scores, percentiles and band ratios, and allow the user to interactively select custom areas for statistical time series comparisons and predictions.

  6. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  7. 47 CFR 73.1650 - International agreements.

    Science.gov (United States)

    2010-10-01

    ... Agreements for the Broadcasting Service in Region 2: (i) MF Broadcasting 535-1605 kHz, Rio de Janeiro, 1981. (ii) MF Broadcasting 1605-1705 kHz, Rio de Janeiro, 1988. (3) Bi-lateral Agreements between the United...

  8. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    Betsill, J. David; Hashimoto, Yu

    2009-08-01

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  9. Financing petroleum agreements

    International Nuclear Information System (INIS)

    Robson, C.J.V.

    1994-01-01

    This chapter describes the typical type of financing agreements which are currently used to finance North Sea petroleum projects whether they are in the cause of development or have been developed and are producing. It deals with the agreements which are entered into to finance borrowings for petroleum projects on a non-resource or limited resource basis. (UK)

  10. Competition for Assistance Agreements

    Science.gov (United States)

    It is EPA policy to promote competition in the award of assistance agreements to the maximum extent practicable.When assistance agreements are awarded competitively, it is EPA policy that the competitive process be fair and open & that no applicant receive

  11. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  12. Implementation of nuclear reduction agreements

    International Nuclear Information System (INIS)

    Scheinman, L.

    1994-01-01

    The collapse of the Soviet Union not only created a new political environment conductive to arms control and disarmament. It also raised unique and unprecedent non-proliferation problems which bear on the implementation of Start I and even on the Non-proliferation treaty insofar as a failure to rein in Ukraine would create a case of instant proliferation and raise questions about whether somehow Russia as a successor of the Soviet Union failed to meet its Non-proliferation Treaty obligation not to 'assist' any other state in acquiring nuclear weapons. The significance of implementing the agreements concerned with non-proliferation, production of highly enriched uranium outside IAEA safeguards, transparency relevance to the international arena, particularly to nuclear issues are discussed as crucial to progress towards a more stable and secure world order. The importance of the Non-proliferation Treaty extension Conference is underlined

  13. Nr 702 - Report made on the behalf of the Foreign affairs Commission on the bill project nr 138 authorizing the approval of the social security agreement under the form of an exchange of letters between the Government of the French Republic and the ITER International Fusion Energy Organization in view of the joint implementation of the ITER project, and Appendix: text of the Foreign affairs Commission

    International Nuclear Information System (INIS)

    Ameline, Nicole

    2013-01-01

    This report first presents the ITER scientific project, its history, its objective (to demonstrate the scientific and technological feasibility of fusion energy), and the ITER Organization which has been specifically created for this international project, and comprises as many domestic agencies as member countries. It gives an overview of the present status of the project construction in southern France. The second part addresses the agreement on social security between the ITER organization and France. The international character of this organization indeed presents risks of disadvantages for the French personnel of the organization. The report evokes the measures contained by the agreement to correct this aspect

  14. A juridical review of partnership agreements that have the elements of work agreements in Indonesia

    Science.gov (United States)

    Nugroho, A.; Sulistyowati, E.; Hikmah, N.

    2018-01-01

    The Partnership Agreements place the parties in an equal position each party has something as the bargaining power. In some cases, employers prefer to use Partnership Agreements to some individuals to complete the work in their company than Work agreements. Practicality and the absence of obligations to fulfil workers’ rights such as the right to join a Union and to get social security are some of the reasons why employers use the Partnership Agreements. Sometimes Partnership Agreement contains jobs, wages and orders which is the characteristic of work agreement. Based on the fact above, the legal issues arise whether the Partnership Agreement can be considered as the Work Agreement or not and which court is authorized to hear in the event of a dispute. To analyze the above legal issues, this research uses normative legal research type with the statute approach. The technique of legal material analysis uses prescriptive techniques to assess the issue and make recommendations. Based on the analysis, it can be concluded that the Partnership Agreement, of which the elements are: wages and orders can be categorized as Work Agreement and therefore in the event of a dispute, the authorized court is Industrial Relations Court.

  15. Evolving Regional Security in the Andean Region

    Science.gov (United States)

    2004-03-19

    Unidas para el Desarrollo (PNUD), Hacia el Objetivo del Milenio de Reducir la Pobreza en América Latina y el Caribe. (Naciones Unidas, February 2003...October 2003. Programa de las Naciones Unidas para el Desarrollo (PNUD), Hacia el Objetivo del Milenio de Reducir la Pobreza en América Latina y el

  16. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  17. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  18. 20 CFR 416.2171 - Duration of agreement.

    Science.gov (United States)

    2010-04-01

    ... selected by whoever wants to end the agreement; or (c)(1) The State fails to pay our costs as agreed; (2....2171 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... and again at the end of each 1-year renewal term, unless— (a) The State and we agree in writing to end...

  19. 7 CFR 766.201 - Shared Appreciation Agreement.

    Science.gov (United States)

    2010-01-01

    ... requires a borrower to enter into a SAA with the Agency covering all real estate security when the borrower: (1) Owns any real estate that serves or will serve as loan security; and (2) Accepts a writedown in... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Servicing Shared Appreciation Agreements and Net...

  20. The Bali Agreement: Implications for Development and the WTO

    Directory of Open Access Journals (Sweden)

    Christophe Bellmann

    2014-05-01

    Full Text Available At the most recent World Trade Organisation (WTO ministerial conference, in December 2013, in Bali, Indonesia, ministers from 160 countries concluded the first multilateral agreement ever negotiated under the auspices of the WTO. After five years of impasse in the moribund Doha Round of trade negotiations, the so-called “Bali package” was enthusiastically welcomed by the world’s governments and international press alike as a critical step towards restoring the credibility of the WTO as a negotiating forum. The centrepiece of the package is without doubt a new agreement on trade facilitation aimed at reducing red tape, and facilitating customs procedures in an effort to cut down the cost of doing business. Other — less far reaching — aspects of the deal focused on food security and a set of issues of particular interest to least developed countries including trade preferences or cotton subsidies. As the dust from the heated Bali negotiations settles, the main challenge for the WTO will now consist in building on this success to re-energise multilateral negotiations and ultimately close the Doha Round. In a world increasingly dominated by regional and bilateral free-trade agreements, members will have to confront the core issues that have divided them for nearly 15 years and find creative solutions to rehabilitate the WTO’s centrality in global trade governance.

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. The resolution of the All-Russia conference “Seismic security of a region and the impact of seismogeological and socioeconomic factors” (Kyzyl, Republic of Tuva, Russian Federation, November 17-18, 2015

    Directory of Open Access Journals (Sweden)

    . . .

    2016-02-01

    Full Text Available This is a brief summary of the All-Russia conference “Seismic security of a region and the impact of seismogeological and socioeconomic factors” held in Kyzyl, Republic of Tuva, Russian Federation on November 17-18, 2015. Also provided is the full text of the resolution adopted at the conference.

  3. International Fisheries Agreements

    DEFF Research Database (Denmark)

    Pintassilgo, Pedro; Kronbak, Lone Grønbæk; Lindroos, Marko

    2015-01-01

    This paper surveys the application of game theory to the economic analysis of international fisheries agreements. The relevance of this study comes not only from the existence of a vast literature on the topic but especially from the specific features of these agreements. The emphasis of the survey...... is on coalition games, an approach that has become prominent in the fisheries economics literature over the last decade. It is shown that coalition games were first applied to international fisheries agreements in the late 1990s addressing cooperative issues under the framework of characteristic function games...... and stability of international fisheries agreements. A key message that emerges from this literature strand is that self-enforcing cooperative management of internationally shared fish stocks is generally difficult to achieve. Hence, the international legal framework and regulations play a decisive role...

  4. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  5. Multilateral and bilateral agreements

    International Nuclear Information System (INIS)

    Koponen, H.

    1993-01-01

    Finland has made both multilateral and bilateral agreements on the exchange of information related to radiation safety. The first arrangements for international agreements and exchange of information were made after the Chernobyl accident. In 1987, Finland joined the convention on early notification of a nuclear power accident coordinated by International Atomic Energy Agency. The convention is applied to accidents that cause of may cause emissions of radioactive substances that might affect the radiation safety of another country. Besides the convention on early notification, some other individual agreements have also been made. These include the International Nuclear Event Scale (INES) system and power companies own information exchange systems. Finland has conducted bilateral agreements with the Nordic countries and the Soviet Union on the notification of accidents and exchange of nuclear power plant information. Today, Russia answers for the Soviet Union's contractual obligations. (orig.)

  6. 19 CFR 114.2 - Customs Conventions and Agreements.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Customs Conventions and Agreements. 114.2 Section 114.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARNETS General Provisions § 114.2 Customs Conventions and Agreements. The...

  7. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  8. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  9. Nuclear arbitration: Interpreting non-proliferation agreements

    International Nuclear Information System (INIS)

    Tzeng, Peter

    2015-01-01

    At the core of the nuclear non-proliferation regime lie international agreements. These agreements include, inter alia, the Nuclear Non-proliferation Treaty, nuclear co-operation agreements and nuclear export control agreements.1 States, however, do not always comply with their obligations under these agreements. In response, commentators have proposed various enforcement mechanisms to promote compliance. The inconvenient truth, however, is that states are generally unwilling to consent to enforcement mechanisms concerning issues as critical to national security as nuclear non-proliferation.3 This article suggests an alternative solution to the non-compliance problem: interpretation mechanisms. Although an interpretation mechanism does not have the teeth of an enforcement mechanism, it can induce compliance by providing an authoritative interpretation of a legal obligation. Interpretation mechanisms would help solve the non-compliance problem because, as this article shows, in many cases of alleged non-compliance with a non-proliferation agreement, the fundamental problem has been the lack of an authoritative interpretation of the agreement, not the lack of an enforcement mechanism. Specifically, this article proposes arbitration as the proper interpretation mechanism for non-proliferation agreements. It advocates the establishment of a 'Nuclear Arbitration Centre' as an independent branch of the International Atomic Energy Agency (IAEA), and recommends the gradual introduction of arbitration clauses into the texts of non-proliferation agreements. Section I begins with a discussion of international agreements in general and the importance of interpretation and enforcement mechanisms. Section II then discusses nuclear non-proliferation agreements and their lack of interpretation and enforcement mechanisms. Section III examines seven case studies of alleged non-compliance with non-proliferation agreements in order to show that the main problem in many cases

  10. Canadian seismic agreement

    International Nuclear Information System (INIS)

    Wetmiller, R.J.; Lyons, J.A.; Shannon, W.E.; Munro, P.S.; Thomas, J.T.; Andrew, M.D.; Lamontagne, M.; Wong, C.; Anglin, F.M.; Plouffe, M.; Lapointe, S.P.; Adams, J.; Drysdale, J.A.

    1990-04-01

    This is the twenty-first progress report under the agreement entitled Canadian Seismic Agreement between the US Nuclear Regulatory Commission (NRC) and the Canadian Commercial Corporation. Activities undertaken by the Geophysics Division of the Geological Survey of Canada (GD/GSC) during the period from July 01, 1988 to June 30, 1989 and supported in part by the NRC agreement are described below under four headings; Eastern Canada Telemetred Network and local network developments, Datalab developments, strong motion network developments and earthquake activity. In this time period eastern Canada experienced its largest earthquake in over 50 years. This earthquake, which has been christened the Saguenay earthquake, has provided a wealth of new data pertinent to earthquake engineering studies in eastern North America and is the subject of many continuing studies, which are presently being carried out at GD and elsewhere. 41 refs., 21 figs., 7 tabs

  11. FFTF Authorization Agreement

    International Nuclear Information System (INIS)

    DAUTEL, W.A.

    2000-01-01

    The purpose of the Authorization Agreement is to serve as a mechanism whereby the U.S. Department of Energy, Richland Operations Office (RL) and Fluor Hanford (FH) jointly clarify and agree to key conditions for conducting work safely and efficiently in the Fast Flux Test Facility (FFTF). Work must be accomplished in a manner that achieves high levels of quality while protecting the environment and the safety and health of workers and the public, and complying with applicable contractual and regulatory requirements. It is the intent of this Agreement to address those items of significant importance in establishing and supporting the FFTF Authorization Envelope, but this Agreement in no way alters the terms and conditions of the Project Hanford Management Contract (PHMC), Contract Number DE-AC06-96RL13200

  12. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  13. Achieve a Better Understanding of Cloud and Precipitation Processes for the Promotion of Water Security in Arid and Semi-Arid Regions

    Science.gov (United States)

    Farrah, S.; Al Yazidi, O.

    2016-12-01

    The UAE Research Program for Rain Enhancement Science (UAEREP) is an international research initiative designed to advance the science and technology of rain enhancement. It comes from an understanding of the needs of countries suffering from scarcity of fresh water, and its will to support innovation globally. The Program focuses on the following topics: Climate change, Climate modelling, Climatology, Atmospheric physics, Atmospheric dynamics, Weather modification, Cloud physics, Cloud dynamics, Cloud seeding, Weather radars, Dust modelling, Aerosol physics , Aerosol chemistry, Aerosol/cloud interactions, Water resources, Physics, Numerical modelling, Material science, Nanotechnology, Meteorology, Hydrology, Hydrogeology, Rocket technology, Laser technology, Water sustainability, Remote sensing, Environmental sciences... In 2015, three research teams from Japan, Germany and the UAE led by Prof. Masataka Murakami, Volker Wulfmeyer and Linda Zou have been respectively awarded. Together, they are addressing the issue of water security through innovative ideas: algorithms and sensors, land cover modification, and nanotechnologies to accelerate condensation. These three projects are undergoing now with extensive research and progresses. This session will be an opportunity to present their latest results as well as to detail the evolution of research in rain enhancement. In 2016 indeed, the Program saw a remarkable increase in participation, with 91 pre-proposals from 398 scientists, researchers and technologists affiliated to 180 institutes from 45 countries. The projects submitted are now focusing on modelling to predict weather, autonomous vehicles, rocket technology, lasers or new seeding materials… The science of rain enhancement offers considerable potential in terms of research, development and innovation. Though cloud seeding has been pursued since the late 1940s, it has been viewed as a relatively marginal field of interest for scientists. This benign neglect

  14. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  15. Diagnosis of regional cerebral blood flow abnormalities using SPECT: agreement between individualized statistical parametric maps and visual inspection by nuclear medicine physicians with different levels of expertise in nuclear neurology

    Energy Technology Data Exchange (ETDEWEB)

    Rocha, Euclides Timoteo da, E-mail: euclidestimoteo@uol.com.b [Fundacao Pio XII, Barretos, SP (Brazil). Hospital de Cancer. Dept. de Medicina Nuclear; Buchpiguel, Carlos Alberto [Hospital do Coracao, Sao Paulo, SP (Brazil). Dept. de Medicina Nuclear; Nitrini, Ricardo [Universidade de Sao Paulo (USP), SP (Brazil). Faculdade de Medicina. Dept. de Neurologia; Tazima, Sergio [Hospital Alemao Oswaldo Cruz (HAOC), Sao Paulo, SP (Brazil). Dept. de Medicina Nuclear; Peres, Stela Verzinhase [Fundacao Pio XII, Barretos, SP (Brazil). Hospital de Cancer; Busatto Filho, Geraldo [Universidade de Sao Paulo (USP), SP (Brazil). Faculdade de Medicina. Div. de Medicina Nuclear

    2009-07-01

    Introduction: visual analysis is widely used to interpret regional cerebral blood flow (rCBF) SPECT images in clinical practice despite its limitations. Automated methods are employed to investigate between-group rCBF differences in research studies but have rarely been explored in individual analyses. Objectives: to compare visual inspection by nuclear physicians with the automated statistical parametric mapping program using a SPECT dataset of patients with neurological disorders and normal control images. Methods: using statistical parametric mapping, 14 SPECT images from patients with various neurological disorders were compared individually with a databank of 32 normal images using a statistical threshold of p<0.05 (corrected for multiple comparisons at the level of individual voxels or clusters). Statistical parametric mapping results were compared with visual analyses by a nuclear physician highly experienced in neurology (A) as well as a nuclear physician with a general background of experience (B) who independently classified images as normal or altered, and determined the location of changes and the severity. Results: of the 32 images of the normal databank, 4 generated maps showing rCBF abnormalities (p<0.05, corrected). Among the 14 images from patients with neurological disorders, 13 showed rCBF alterations. Statistical parametric mapping and physician A completely agreed on 84.37% and 64.28% of cases from the normal databank and neurological disorders, respectively. The agreement between statistical parametric mapping and ratings of physician B were lower (71.18% and 35.71%, respectively). Conclusion: statistical parametric mapping replicated the findings described by the more experienced nuclear physician. This finding suggests that automated methods for individually analyzing rCBF SPECT images may be a valuable resource to complement visual inspection in clinical practice. (author)

  16. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  18. International environmental agreements

    NARCIS (Netherlands)

    de Zeeuw, Aart

    2015-01-01

    The regulation of environmental externalities at the global level requires international agreements between sovereign states. Game theory provides an appropriate theoretical tool for analysis. However, game theory can result in a wide range of outcomes, and therefore it is important to discuss the

  19. FFTF Authorization Agreement

    International Nuclear Information System (INIS)

    DAUTEL, W.A.

    2000-01-01

    The purpose of the Authorization Agreement is to serve as a mechanism whereby the U.S. Department of Energy, Richland Operations Office (RL) and Fluor Hanford (FH) jointly clarify and agree to key conditions for conducting work safely and efficiently

  20. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  1. 48 CFR 225.870-8 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  2. 48 CFR 52.204-2 - Security Requirements.

    Science.gov (United States)

    2010-10-01

    ... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security...

  3. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  4. The Sicomines Agreement

    DEFF Research Database (Denmark)

    Jansson, Johanna

    of the global political economy have shifted, and that China’s position as a foreign policy actor is now consolidated. Continuity, since the 2009 amendment of the agreement, which came about partly as a result of China’s ambitions to take up an active role in the International Monetary Fund (IMF......), was to the benefit of the policy preferences of the IMF and the World Bank. This case thus indicates that since China’s own aspirations are changeable, its emergence as an alternative development partner may not bring about any substantive change of direction for the DRC’s international relations. Furthermore......The Sicomines multibillion minerals-for-infrastructure deal was struck in 2007 between the Democratic Republic of Congo (DRC) and China. The paper investigates the drivers behind the original conception of the agreement, outlines the structure of the contract, analyses the dynamics at play during...

  5. Agreements in Virtual Organizations

    Science.gov (United States)

    Pankowska, Malgorzata

    This chapter is an attempt to explain the important impact that contract theory delivers with respect to the concept of virtual organization. The author believes that not enough research has been conducted in order to transfer theoretical foundations for networking to the phenomena of virtual organizations and open autonomic computing environment to ensure the controllability and management of them. The main research problem of this chapter is to explain the significance of agreements for virtual organizations governance. The first part of this chapter comprises explanations of differences among virtual machines and virtual organizations for further descriptions of the significance of the first ones to the development of the second. Next, the virtual organization development tendencies are presented and problems of IT governance in highly distributed organizational environment are discussed. The last part of this chapter covers analysis of contracts and agreements management for governance in open computing environments.

  6. REAL ESTATE PURCHASE AGREEMENTS

    Directory of Open Access Journals (Sweden)

    Bujorel FLOREA

    2016-12-01

    Full Text Available The study presented herein represents a field with good present and future perspectives, especially because real estate property is not under the incidence of a single normative act regarding the sale-purchase agreement of such goods, and given the fact that there are specific legal provisions with respect to various real estate categories and the localization of such property. The article deals with the sale-purchase agreement of various real estate categories, such as fields, buildings, the correspondent lots, urban area, farm, and forests fields, focusing on some particularities. A special care is attributed to examining the applicable laws with regard to the purchase agreements of field lands, the special conditions to be taken into account, the persons that may act as buyers, including foreigners, those without citizenship, and legal persons of a nationality other than Romanian. Finally, a special concern is given to the formalities required for legally exerting the pre-emptive right and the applicable sanctions in that respect.

  7. Old Dog New Tricks: Use of Point-based Crop Models in Grid-based Regional Assessment of Crop Management Technologies Impact on Future Food Security

    Science.gov (United States)

    Koo, J.; Wood, S.; Cenacchi, N.; Fisher, M.; Cox, C.

    2012-12-01

    HarvestChoice (harvestchoice.org) generates knowledge products to guide strategic investments to improve the productivity and profitability of smallholder farming systems in sub-Saharan Africa (SSA). A keynote component of the HarvestChoice analytical framework is a grid-based overlay of SSA - a cropping simulation platform powered by process-based, crop models. Calibrated around the best available representation of cropping production systems in SSA, the simulation platform engages the DSSAT Crop Systems Model with the CENTURY Soil Organic Matter model (DSSAT-CENTURY) and provides a virtual experimentation module with which to explore the impact of a range of technological, managerial and environmental metrics on future crop productivity and profitability, as well as input use. For each of 5 (or 30) arc-minute grid cells in SSA, a stack of model input underlies it: datasets that cover soil properties and fertility, historic and future climate scenarios and farmers' management practices; all compiled from analyses of existing global and regional databases and consultations with other CGIAR centers. Running a simulation model is not always straightforward, especially when certain cropping systems or management practices are not even practiced by resource-poor farmers yet (e.g., precision agriculture) or they were never included in the existing simulation framework (e.g., water harvesting). In such cases, we used DSSAT-CENTURY as a function to iteratively estimate relative responses of cropping systems to technology-driven changes in water and nutrient balances compared to zero-adoption by farmers, while adjusting model input parameters to best mimic farmers' implementation of technologies in the field. We then fed the results of the simulation into to the economic and food trade model framework, IMPACT, to assess the potential implications on future food security. The outputs of the overall simulation analyses are packaged as a web-accessible database and published

  8. 14 CFR 380.34 - Security and depository agreements.

    Science.gov (United States)

    2010-01-01

    ... travel agents shall be deposited with and maintained by the bank subject to the following conditions: (i... charter participants by retail travel agents, the retail travel agent may deduct his commission and remit... travel agent agrees in writing with the charter operator or foreign charter operator that if the charter...

  9. Value-driven Security Agreements in Extended Enterprises

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    2010-01-01

    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new

  10. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    market , accounting for $24.9 billion in exports . An estimated 800,000 U.S. jobs are tied to trade with China .6 President Nixon’s 1972 goal of bringing...pursued a foreign policy initiative referred to as the “North American Accord,” explaining, A developing closeness among Canada, Mexico , and the United...framework to facilitate better cooperation with their powerful southern neighbor.9 Reagan’s North American Accord with Mexico took longer to evolve

  11. Value-driven Security Agreements in Extended Enterprises

    OpenAIRE

    Franqueira, Virginia Nunes Leal; Wieringa, Roel

    2010-01-01

    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third p...

  12. MULTILATERAL ENVIRONMENTAL AGREEMENTS AND THE TRADE MEASURES CONTAINED IN THESE AGREEMENTS

    Directory of Open Access Journals (Sweden)

    Margareta Timbur

    2012-06-01

    Full Text Available The environmental problems which the society is facing, ozone depletion, biodiversity loss, the spread of persistent organic pollutants, are a result of human activity with a worldwide impact, requiring immediate resolution. In this context, negotiation, signing and implementation of several multilateral environmental agreements (MEAs are one of the best solutions, affordable and reliable. The aim of this study is to analyze the commercial measures, which to some extent, ensure stability, security, and expansion of MEAs. The paper discusses, also, the efficiency, necessity and the influences of trade measures in MEAs and the WTO role in signing these agreements.

  13. International Environmental Agreements: Emissions Trade, Safety Valves and Escape Clauses

    International Nuclear Information System (INIS)

    Karp, Larry; Zhao, Jinhua

    2010-01-01

    We explain how the structure of multi-national or multi-regional environmental agreements affect their chance of success. Trade in emissions permits has ambiguous and in some cases surprising effects on both the equilibrium level of abatement, and on the ability to persuade nations or regions to participate in environmental agreements. An escape clause policy and a safety valve policy have essentially the same properties when membership in environmental agreement is pre-determined, but they create markedly different effects on the incentives to join such an agreement. The two policies lead to a qualitative difference in the leverage that a potential member of the agreement exercises on other members

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  17. International nuclear agreements

    International Nuclear Information System (INIS)

    Miatello, A.; Severino, R.

    1988-01-01

    This multilingual glossary, in the laborious compilation of which the authors have been greatly assisted by a group of professional translators and experts, presents for the first time a substantial number of entries in four languages (English, French, German and Italian), whose terminology and phraseology, all bearing the appropriate normative reference, has been drawn from the official text of the most relevant international agreements on nuclear policy. It is complemented by a thorough critical study on the status of nonproliferation by Lawrence Scheinman and Josef Pilat. Librarians, translators and interpreters as well as scholars and researchers in international law will find this volume a reference tool of specific interest

  18. Agreement in Persian

    Directory of Open Access Journals (Sweden)

    Lofti, Ahmad R.

    2006-01-01

    Full Text Available This article investigates agreement as a number marking mechanism in Persian. The mechanism differs from number marking on nominals in that with an inanimate plural subject, the SG verbal ending signals a collective conceptualization of the experience where the members of the group are considered together as a single unit. The PL ending, on the other hand, signals a distributive conceptualization where the entities are individuated; hence, they are considered to be dispersed over space, or distinct in sort or time. Autonomy - whether the entity is conceived of as governing the course of events or not - seems to underlie the choice between SG and PL.

  19. License agreement, employee work

    OpenAIRE

    Poncová, Veronika

    2012-01-01

    The rigorous thesis is focused on license agreement and employee work. The aim of the thesis is not only an analysis of the use of a copyrighted work by a person different from the author of the work, but also an analysis of the performance of copyright by a person different from the author of the work. The thesis consists of five chapters. The opening chapter provides a summary of the notion of copyright, its sources at the national and international levels, but also the European Union legis...

  20. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  1. Cooperation in the maintenance of peace and security, and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate an exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. This publication is based on material presented at the regional meeting on the Cooperation in the maintenance of peace and security, held at the United Nations Regional Centre for Peace and Disarmament in Asia and the Pacific, in Kathmandu, Nepal, from 31 January to 2 February 1994

  2. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  3. Proceedings of Regional Asia Pacific Defence Environmental Workshop Held in Darwin, Australia on 11-14 May 1998 (Environmental Security Series Number 5)

    Science.gov (United States)

    1998-05-01

    actions being undertaken to combat these issues, and the mutual benefits obtained through the partnership arrangement. The Conference was also attended...1993 (Oxford: Oxford University Press) Butts, Kent Hughes (1994) Environmental security: a partnership for peace. Strategic Studies Institute...GOVERNMENTAL ORGANISATIONS (NGOs) Mr. Michael Rae Program Leader-Resource Conservation World Wide Fund For Nature-Australia ( WWF -Australia

  4. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  5. Clinically acceptable agreement between the ViMove wireless motion sensor system and the Vicon motion capture system when measuring lumbar region inclination motion in the sagittal and coronal planes

    DEFF Research Database (Denmark)

    Mjøsund, Hanne Leirbekk; Boyle, Eleanor; Kjær, Per

    2017-01-01

    . CONCLUSIONS: We found a clinically acceptable level of agreement between these two methods for measuring standing lumbar inclination motion in these two cardinal movement planes. Further research should investigate the ViMove system's ability to measure lumbar motion in more complex 3D functional movements...

  6. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  7. Regional Education Partners

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  8. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  9. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  10. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  11. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  12. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  15. The new strategic balance and cooperative security

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    The new strategic balance and cooperative security in the world now is discussed including the following issues: strategic balances and the features of the old strategic environment; the main characteristics of the new political and security environment; the future role of nuclear weapons; the role of arms limitation agreements

  16. Perspectives on Global and Regional Security and Implications of Nuclear and Space Technologies: U.S.-Brazil Strategic Dialogue, Phase 2 Report

    Science.gov (United States)

    2014-10-01

    enhanced leverage in South- South and BRICs groupings. 6 Under President Lula da Silva’s leadership, Brazil sought to actively enhance and promote its...State,” 25, 35-36; Joe Leahy and James Lamont, “ BRICs to Debate Creation of Common Bank,” Financial Times, March 20, 2012.   4   Challenges in the...conflict. As previously, mentioned, UNASUR is viewed as a proto-security community. The BRICS (Brazil-Russia-India-China-South Africa) grouping

  17. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    1993-01-01

    In the face of improved international relations, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being actively encouraged by the international community. Towards this end, the United Nations Office for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground and delineating areas of possible future negotiation and agreement. Within this framework, a Conference on the theme 'Disarmament and national security in an interdependent world' was held in Kyoto, Japan, from 13 to 16 April 1993. The Conference, the third one in a series held in Kyoto on disarmament issues, was organized by the Office for Disarmament Affairs through the Regional Centre for Peace and Disarmament in Asia and the Pacific and in collaboration with the Government of Japan and the Prefecture and City of Kyoto. This publication is based on material presented at that Conference

  18. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  19. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    OpenAIRE

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  20. VHA Data Sharing Agreement Repository

    Data.gov (United States)

    Department of Veterans Affairs — The VHA Data Sharing Agreement Repository serves as a centralized location to collect and report on agreements that share VHA data with entities outside of VA. It...