WorldWideScience

Sample records for safe-secure trailer subject

  1. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  2. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  3. Durability testing of the high-capacity GA-4/GA-9 trailer

    International Nuclear Information System (INIS)

    Zimmer, A.

    1993-01-01

    General Atomics (GA) is under contract to the US Department of Energy (DOE), Idaho Field Office, to develop two legal-weight truck from-reactor spent-fuel shipping casks with trailers. GA is developing these high capacity transport systems to support the Office of Civilian Radioactive Waste Management's (OCRWM) mission to transport spent fuel from reactors to a permanent disposal site. GA's goal is to maximize the number of fuel assemblies that the transport system can safely carry. The GA-4 Cask is being designed to transport four pressurized-water-reactor (PWR) spent-fuel assemblies, and the GA-9 Cask is being designed to transport nine boiling-water-reactor (BWR) spent-fuel assemblies. The use of these high-capacity transport systems will have a large benefit to-public safety since the number of legal-weight truck shipments will be reduced by at least a factor of four over existing spent-fuel shipping cask systems. Achieving these capacities requires that the weight of each component of the transport system. i.e., cask, trailer and tractor, be minimized. The weight of the trailer is of particular importance. With a high load-to-weight ratio, the durability and reliability of the trailer become significant factors in the success of the transport system. In order to verify that the trailer design will meet the durability and performance requirements to safely transport spent-fuel, GA has planned an extensive testing program. The testing program includes non-destructive examination (NDE) of the trailer welds, operational testing, a static load test, an over-the-road performance test, and a test to verify the durability of the trailer up to its 1,000,000-mile design life. Since a prototype cask will not be available for the testing, GA designed and built a dummy payload that simulates the correct weight distribution and approximates the dynamic response of the prototype cask

  4. SUSTAINABLE TRAILER FLOORING

    Directory of Open Access Journals (Sweden)

    John Lu

    2009-05-01

    Full Text Available Different trailer flooring materials, including wood-based, aluminum, steel, and synthetic plastic floors, were evaluated in accordance with their durability and sustainability to our natural environment. Wood-based trailer flooring is an eco-friendly product. It is the most sustainable trailer flooring material compared with fossil fuel-intensive steel, aluminum, and plastics. It is renewable and recyclable. Oak, hard maple, and apitong are strong and durable hardwood species that are currently extensively used for trailer flooring. For manufacture, wood-based flooring is higher in energy efficiency and lower in carbon emission than steel, aluminum and plastics. Moreover, wood per se is a natural product that sequesters carbon. Accordingly, using more wood-based trailer flooring is effective to reduce global warming.

  5. Trailer steering control of a tractor-trailer Robot

    NARCIS (Netherlands)

    Ritzen, P.J.; Roebroek, E.J.W.; Van De Wouw, N.; Jiang, Z.P.; Nijmeijer, H.

    2016-01-01

    In this paper, we consider active trailer steering control as a means to improve the maneuverability of (long) truck-trailer combinations during cornering. Hereto, we formulate the problem of reducing the so-called swept path width during cornering and that of eliminating unsafe tail swing of the

  6. SUSTAINABLE TRAILER FLOORING

    OpenAIRE

    John Lu; Marc Chorney; Lowell Peterson

    2009-01-01

    Different trailer flooring materials, including wood-based, aluminum, steel, and synthetic plastic floors, were evaluated in accordance with their durability and sustainability to our natural environment. Wood-based trailer flooring is an eco-friendly product. It is the most sustainable trailer flooring material compared with fossil fuel-intensive steel, aluminum, and plastics. It is renewable and recyclable. Oak, hard maple, and apitong are strong and durable hardwood species that are curren...

  7. Fixing Trailer Hitch for Roof Rack of Cargos

    Directory of Open Access Journals (Sweden)

    Darina Matisková

    2017-02-01

    Full Text Available This article presents a new technical solution of fixing trailer hitch which serves as a connection between single track vehicle and cargo, mainly light trailer. They are manufactured from steel girder and nets which are constructed by point welding. They are designed to indicate the necessary solidity and the required load bearing capacity of the cargo. The application of roof racks is universal and these products are in great demand in the field of game management. There are a lot of trailer hitches which the manufacturers tailor to customers´ demands. The stated technical solution is subject of published industrial utility model at the Industrial property office of the Slovak republic.

  8. Laser Safety and Hazard Analysis for the Trailer (B70) Based AURA Laser System

    International Nuclear Information System (INIS)

    AUGUSTONI, ARNOLD L.

    2003-01-01

    A laser safety and hazard analysis was performed for the AURA laser system based on the 2000 version of the American National Standards Institute's (ANSI) Standard Z136.1, for ''Safe Use of Lasers'' and the 2000 version of the ANSI Standard Z136.6, for ''Safe Use of Lasers Outdoors''. The trailer based AURA laser system is a mobile platform, which is used to perform laser interaction experiments and tests at various national test sites. The trailer (B70) based AURA laser system is generally operated on the United State Air Force Starfire Optical Range (SOR) at Kirtland Air Force Base (KAFB), New Mexico. The laser is used to perform laser interaction testing inside the laser trailer as well as outside the trailer at target sites located at various distances from the exit telescope. In order to protect personnel, who work inside the Nominal Hazard Zone (NHZ), from hazardous laser emission exposures it was necessary to determine the Maximum Permissible Exposure (MPE) for each laser wavelength (wavelength bands) and calculate the appropriate minimum Optical Density (OD min ) of the laser safety eyewear used by authorized personnel and the Nominal Ocular Hazard Distance (NOHD) to protect unauthorized personnel who may have violated the boundaries of the control area and enter into the laser's NHZ

  9. Trailer-targeting a potential audience

    OpenAIRE

    Brůnová, Lada

    2013-01-01

    How can movie production companies speak to their potential audience thru movie trailers? Which means do they use and what is the public reception? How does a viewer interpret a movie trailer? What can we learn about viewers from movie trailers? This thesis is offering all the answers to questions mentioned above in two different parts - in the first part the concepts of movie trailers are introduced and explained, the second part analyses the outcomes of a research which studies the affects ...

  10. [Safeguards for the physical protection of nuclear materials and facilities

    International Nuclear Information System (INIS)

    Jones, O.E.

    1975-01-01

    Testimony is given on the subject of safeguards for the physical protection of nuclear materials and facilities, particularly during transportation. The ERDA nation-wide safe-secure transportation system and the Safe-Secure Trailer are described. The nationwide ERDA voice communication system is also described. Development of hardware and systems is discussed. The use of adversary simulation for evaluating protection systems is mentioned

  11. Becoming Trivial: The Book Trailer

    Directory of Open Access Journals (Sweden)

    Kati Voigt

    2013-12-01

    Full Text Available Despite the introduction of audiobooks and e-books, printed stories still are in high demand. However, in a globalized world which is more and more ruled by mass media and technology, it is increasingly difficult for writers and publishers to promote their books. The solution is almost ironic: popular media, which is assumed to decrease readership, is turned into a tool to increase the number of readers. In 2002 the book trailer emerged as a new web-based marketing strategy for the launch of new books. Since then the appearance of the book trailer has changed considerably. The article examines specific examples and highlights methods that establish the relationship between the content of the book and its representation in the book trailer. Although guidelines apply for the production of book trailers, such as constraints relating to time and content, there are no limitations for the imagination of the producers. A book trailer may be simple, supported only by music and pictures, but they may also be as complex as short films. Additionally, book trailers are not limited to the promotion of one specific genre or age group. Depending on the viral potential of social networks such as YouTube, Facebook, and Tumblr book trailers reach a global audience and, therefore, open up new markets. It can be argued, while book trailers have not yet reached the realm of the everyday, they will gradually come to the attention of academics and this article wants to present a starting point for this development.

  12. Online Movie Trailers - A Reception Analysis

    OpenAIRE

    Jensen, Frida Videbæk; Rozé, Caroline

    2014-01-01

    This project is a reception analysis of how a target group receive online movie trailers. It utilized a focus group as means of research with participants from the dormitories Kollibrien and Korallen. We concluded that the group we investigated were not interested in online movie trailers as anything else than a preview of a movie. They preferred to experience movie trailers in the cinema. Their opinion of specific movie trailers were also determined by whether or not they identified with the...

  13. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  14. One Health in food safety and security education: Subject matter outline for a curricular framework.

    Science.gov (United States)

    Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I

    2017-06-01

    Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  15. One Health in food safety and security education: Subject matter outline for a curricular framework

    Directory of Open Access Journals (Sweden)

    John A. Angelos

    2017-06-01

    Full Text Available Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  16. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  17. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  18. The design, fabrication and maintenance of semi-trailers employed in the highway transport of weight-concentrated radioactive loads

    Energy Technology Data Exchange (ETDEWEB)

    Huffman, D.S. [Allied-Signal Inc., Metropolis, IL (United States)

    1991-12-31

    Transportation of weight-concentrated radioactive loads by truck is an essential part of a safe and economical nuclear industry. This proposed standard presents guidance and performance criteria for the safe transport of these weight-concentrated radioactive loads. ANSI N14.30 will detail specific requirements for the design, fabrication, testing, in-service inspections, maintenance and certification of the semi-trailers to be employed in said service. Furthermore, guidelines for a quality assurance program are also enumerated. This standard would apply to any semi-trailer that may or may not be specifically designed to carry weight-concentrated loads. Equipment not suitable per the criteria established in the standard would be removed from service. The nature of the nuclear industry and the need for a positive public perception of the various processes and players, mandates that the highway transportation of weight-concentrated radioactive loads be standardized and made inherently safe. This proposed standard takes a giant step in that direction.

  19. Driver assistance system for passive multi-trailer vehicles with haptic steering limitations on the leading unit.

    Science.gov (United States)

    Morales, Jesús; Mandow, Anthony; Martínez, Jorge L; Reina, Antonio J; García-Cerezo, Alfonso

    2013-04-03

    Driving vehicles with one or more passive trailers has difficulties in both forward and backward motion due to inter-unit collisions, jackknife, and lack of visibility. Consequently, advanced driver assistance systems (ADAS) for multi-trailer combinations can be beneficial to accident avoidance as well as to driver comfort. The ADAS proposed in this paper aims to prevent unsafe steering commands by means of a haptic handwheel. Furthermore, when driving in reverse, the steering-wheel and pedals can be used as if the vehicle was driven from the back of the last trailer with visual aid from a rear-view camera. This solution, which can be implemented in drive-by-wire vehicles with hitch angle sensors, profits from two methods previously developed by the authors: safe steering by applying a curvature limitation to the leading unit, and a virtual tractor concept for backward motion that includes the complex case of set-point propagation through on-axle hitches. The paper addresses system requirements and provides implementation details to tele-operate two different off- and on-axle combinations of a tracked mobile robot pulling and pushing two dissimilar trailers.

  20. Driver Assistance System for Passive Multi-Trailer Vehicles with Haptic Steering Limitations on the Leading Unit

    Directory of Open Access Journals (Sweden)

    Antonio J. Reina

    2013-04-01

    Full Text Available Driving vehicles with one or more passive trailers has difficulties in both forward and backward motion due to inter-unit collisions, jackknife, and lack of visibility. Consequently, advanced driver assistance systems (ADAS for multi-trailer combinations can be beneficial to accident avoidance as well as to driver comfort. The ADAS proposed in this paper aims to prevent unsafe steering commands by means of a haptic handwheel. Furthermore, when driving in reverse, the steering-wheel and pedals can be used as if the vehicle was driven from the back of the last trailer with visual aid from a rear-view camera. This solution, which can be implemented in drive-by-wire vehicles with hitch angle sensors, profits from two methods previously developed by the authors: safe steering by applying a curvature limitation to the leading unit, and a virtual tractor concept for backward motion that includes the complex case of set-point propagation through on-axle hitches. The paper addresses system requirements and provides implementation details to tele-operate two different off- and on-axle combinations of a tracked mobile robot pulling and pushing two dissimilar trailers.

  1. STRENGTH ANALYSIS OF THE FRAME OF A TRAILER

    Directory of Open Access Journals (Sweden)

    Silvia MEDVECKÁ-BEŇOVÁ

    2017-09-01

    Full Text Available A trailer for carrying a small boat or water scooters was designed for a private sector company. It was a category O1 non-braked trailer with a gross weight up to 750 kg and a height-adjustable traction device. The frame must be designed and installed in such a way that, during its proposed lifetime, it will withstand all the loads and influences that may occur during construction and operation with an appropriate level of reliability. The designed frame of the trailer is a welded galvanized structure. The article is devoted to the problems related to the stress analysis of a trailer frame.

  2. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  3. Factory Acceptance Test Procedure Westinghouse 100 ton Hydraulic Trailer

    International Nuclear Information System (INIS)

    Aftanas, B.L.

    1994-01-01

    This Factory Acceptance Test Procedure (FAT) is for the Westinghouse 100 Ton Hydraulic Trailer. The trailer will be used for the removal of the 101-SY pump. This procedure includes: safety check and safety procedures; pre-operation check out; startup; leveling trailer; functional/proofload test; proofload testing; and rolling load test

  4. Keeping Sealed Radioactive Sources Safe and Secure

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Radioactive sources are used in a wide variety of devices in medical, industrial, agricultural and research facilities worldwide. These sources, such as cobalt-60 and caesium-137, emit high levels of ionizing radiation, which can treat cancer, measure materials used in industry and sterilize food and medical appliances. Problems may arise when these sources are no longer needed, or if they are damaged or decayed. If these sources are not properly stored they can be a threat to human health and the environment and pose a security risk. Procedures to secure these spent or 'disused' sources are often highly expensive and need specialized assistance. The IAEA helps its States find long term solutions for the safe and secure storage of disused sealed radioactive sources (DSRSs)

  5. 49 CFR 238.413 - End structures of trailer cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  6. Long Length Contaminated Equipment Retrieval System Receiver Trailer and Transport Trailer Operations and Maintenance Manual

    International Nuclear Information System (INIS)

    DALE, R.N.

    2000-01-01

    A system to accommodate the removal of long-length contaminated equipment (LLCE) from Hanford underground radioactive waste storage tanks was designed, procured, and demonstrated, via a project activity during the 1990s. The system is the Long Length Contaminated Equipment Removal System (LLCERS). LLCERS will be maintained and operated by Tank Farms Engineering and Operations organizations and other varied projects having a need for the system. The responsibility for the operation and maintenance of the LLCERS Receiver Trailer (RT) and Transport Trailer (TT) resides with the RPP Characterization Project Operations organization. The purpose of this document is to provide vendor supplied operating and maintenance (O and M) information for the RT and TT in a readily retrievable form. This information is provided this way instead of in a vendor information (VI) file to maintain configuration control of the operations baseline as described in RPP-6085, ''Configuration Management Plan for Long Length Contaminated Equipment Receiver and Transport Trailers''. Additional Operations Baseline documents are identified in RPP-6085

  7. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  8. Long Length Contaminated Equipment Retrieval System Receiver Trailer and Transport Trailer Operations and Maintenance Manual

    Energy Technology Data Exchange (ETDEWEB)

    DALE, R.N.

    2000-05-01

    A system to accommodate the removal of long-length contaminated equipment (LLCE) from Hanford underground radioactive waste storage tanks was designed, procured, and demonstrated, via a project activity during the 1990s. The system is the Long Length Contaminated Equipment Removal System (LLCERS). LLCERS will be maintained and operated by Tank Farms Engineering and Operations organizations and other varied projects having a need for the system. The responsibility for the operation and maintenance of the LLCERS Receiver Trailer (RT) and Transport Trailer (TT) resides with the RPP Characterization Project Operations organization. The purpose of this document is to provide vendor supplied operating and maintenance (O & M) information for the RT and TT in a readily retrievable form. This information is provided this way instead of in a vendor information (VI) file to maintain configuration control of the operations baseline as described in RPP-6085, ''Configuration Management Plan for Long Length Contaminated Equipment Receiver and Transport Trailers''. Additional Operations Baseline documents are identified in RPP-6085.

  9. Durability testing of the high-capacity GA-4/GA-9 trailer

    International Nuclear Information System (INIS)

    Zimmer, A.; Lyon, T.

    1995-01-01

    GA designed trailers to transport the GA-4 and GA-9 LWT from-reactor spent nuclear fuel shipping casks. GA designed and fabricated the GA-9 trailer to ANSI N14.30 requirements and is now performing a durability test at the AlliedSignal Automotive Proving Grounds. The trailer, simulated cask and tractor. The test program objective is to evaluate and improve, as necessary, the trailer's durability, reliability and performance

  10. Incidence of Trailer Frame Structure on Driver’s Safety during Log Transportation

    Directory of Open Access Journals (Sweden)

    Marco Manzone

    2017-11-01

    Full Text Available The frame structure of the trailer may influence both the traction and the tractor-trailer stability, especially along sloped paths. The aim of this research was to analyze a trailer overturning and the strains on the connected tractors (wheeled, or crawled during log transportation (loose or tied along a hillside. Two two-axle trailers were used: tandem and turntable steering. Three types of measurements were carried out during the field tests: (i the detachment from the ground of the rear upstream wheels (or crawler; (ii the transversal and longitudinal strains occurring when the trailer overturned (and released the hooking system of the tractor; (iii the lateral deviation of the rear wheels (or crawler of the tractor. The study highlighted that the two-axle trailer with turntable steering combined with the crawl tractor gave better results in terms of safety during trailer overturning. In addition, independent of the type of trailer, a tied load was found to be more dangerous than a load restrained only by steel struts, because when overturning, the load forms a single unit with the trailer mass which increases the strains.

  11. Fake and fan film trailers as incarnations of audience anticipation and desire

    Directory of Open Access Journals (Sweden)

    Kathleen Amy Williams

    2012-03-01

    Full Text Available In the lead-up to the release of some feature films, fake and fan trailers are created by users and uploaded to YouTube and other Web sites. These trailers demonstrate that users are literate not only in the form of the trailer itself, but also in the Hollywood system and how it markets products to audiences. Circulating in a networked environment online, these texts, which play with the form of the trailer, perform and embody users' and fans' desire to see not just the feature film but also the official trailer itself. I discuss these fake and fan trailers in relation to cinematic anticipation and describe how they navigate both spatial and temporal bounds. Using the architectural concept of the desire line, I argue that spatial frameworks can be usefully employed to consider how users navigate online spaces, media, and concepts through the form of the trailer.

  12. Are double trailers cost effective for transporting forest biomass on steep terrain?

    Directory of Open Access Journals (Sweden)

    Rene Zamora-Cristales

    2015-07-01

    Full Text Available Transportation of forest biomass on steep terrain involves logistical challenges. Trucks with large single trailers are often unable to travel on forest roads due to their narrowness, tight curves, adverse grades and limited areas to turn around. A shorter trailer must be used but then transportation capacity is limited by the trailer volume due to the low bulk density of the processed biomass, particularly when the biomass is dry. With double trailers, transportation capacity can be limited by allowable legal weight based on axle number and spacing. We developed a simulation model that explores the economic feasibility of using double-trailer configurations to transport forest biomass to a bioenergy facility from the grinder at a landing or from a centralized yard in Washington, Oregon and California. Results show that double trailers can be a cost effective alternative to single trailers under limited conditions in Oregon and Washington, but they are not a competitive option in California due to the state's transportation regulations.

  13. Configuration Management Plan for Long Length Contaminated Equipment Receiver and Transport Trailers

    International Nuclear Information System (INIS)

    DALE, R.N.

    2000-01-01

    Long Length Contaminated Equipment Removal System Receiver Trailer and Transport Trailer require a configuration management plan for design, requirements and operations baseline documents. This report serves as the plan for the Trailers

  14. Reversing Control of a Car with a Trailer Using the Driver Assistance System

    Directory of Open Access Journals (Sweden)

    Jae Il Roh

    2011-06-01

    Full Text Available Passive trailer systems provide a variety of advantages in delivery and transportation applications. The transportation capacity of the truck with multiple trailers can be increased in proportion to the number of trailers. The cost of the car with trailers is much lower than the cost of multiple cars. However, the major drawback of the trailer system is that the control problem is difficult. We concentrate on the motion control problem of ʺpushingʺ trailers because pushing is much more difficult than ʺpullingʺ. In this paper, it is shown how the car with passive trailers can be easily controlled by the use of the proposed driver assist system and the motion control scheme. Since the keypad is the only additional device for the driver assist system, the proposed scheme can be implemented with the conventional trucks without many hardware modifications. The manual control strategy of pushing is established. The kinematic design of the passive trailer is adopted from the prior work (Park and Chung, 2004. The kinematic configuration design of the car with trailers is proposed for pushing control. The usefulness of the proposed scheme is experimentally verified with the small scale car with trailer system for the car parking problem. The parking control requires forward and reverse motion in narrow environment. It is shown that even beginners can easily control the pushing motion with the proposed scheme.

  15. Reversing Control of a Car with a Trailer Using the Driver Assistance System

    Directory of Open Access Journals (Sweden)

    Jae Roh

    2011-06-01

    Full Text Available Passive trailer systems provide a variety of advantages in delivery and transportation applications. The transportation capacity of the truck with multiple trailers can be increased in proportion to the number of trailers. The cost of the car with trailers is much lower than the cost of multiple cars. However, the major drawback of the trailer system is that the control problem is difficult. We concentrate on the motion control problem of “pushing” trailers because pushing is much more difficult than “pulling”. In this paper, it is shown how the car with passive trailers can be easily controlled by the use of the proposed driver assist system and the motion control scheme. Since the keypad is the only additional device for the driver assist system, the proposed scheme can be implemented with the conventional trucks without many hardware modifications. The manual control strategy of pushing is established. The kinematic design of the passive trailer is adopted from the prior work (Park and Chung, 2004. The kinematic configuration design of the car with trailers is proposed for pushing control. The usefulness of the proposed scheme is experimentally verified with the small scale car with trailer system for the car parking problem. The parking control requires forward and reverse motion in narrow environment. It is shown that even beginners can easily control the pushing motion with the proposed scheme.

  16. Work Zone Data Collection Trailer

    Data.gov (United States)

    Federal Laboratory Consortium — The Work Zone Data Collection Trailer was designed and constructed to enhance data collection and analysis capabilities for the "Evaluating Roadway Construction Work...

  17. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  18. Cigarette smoking and perception of a movie character in a film trailer.

    Science.gov (United States)

    Hanewinkel, Reiner

    2009-01-01

    To study the effects of smoking in a film trailer. Experimental study. Ten secondary schools in Northern Germany. A sample of 1051 adolescents with a mean (SD) age of 14.2 (1.8) years. Main Exposures Participants were randomized to view a 42-second film trailer in which the attractive female character either smoked for about 3 seconds or did not smoke. Perception of the character was measured via an 8-item semantic differential scale. Each item consisted of a polar-opposite pair (eg, "sexy/unsexy") divided on a 7-point scale. Responses to individual items were summed and averaged. This scale was named "attractiveness." The Cronbach alpha for the attractiveness rating was 0.85. Multilevel mixed-effects linear regression was used to test the effect of smoking in a film trailer. Smoking in the film trailer did not reach significance in the linear regression model (z = 0.73; P = .47). Smoking status of the recipient (z = 3.81; P film trailer and smoking status of the recipient (z = 2.21; P = .03) both reached statistical significance. Ever smokers and never smokers did not differ in their perception of the female character in the nonsmoking film trailer. In the smoking film trailer, ever smokers judged the character significantly more attractive than never smokers. Even incidental smoking in a very short film trailer might strengthen the attractiveness of smokers in youth who have already tried their first cigarettes.

  19. Ultra Safe And Secure Blasting System

    Energy Technology Data Exchange (ETDEWEB)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  20. Design and energetical feasibility study of a refrigerated trailer with photovoltaic solar energy; Diseno y estudio de viabilidad energetica de un trailer refrigerado mediante energia solar fotovoltaica

    Energy Technology Data Exchange (ETDEWEB)

    Callen, S.; Ibanez, M.; Cabeza, L. F.

    2004-07-01

    In this study we have tried to show the energetic viability and the design of a refrigerated trailer, in which it has changed the traditional oil generator from the refrigeration system to a photovoltaic generator. Due to restrictions of design limited by trailer dimensions and the horizontal positions of modules, as one of the first conclusion has been necessary to reduce the refrigeration charge, to obtain the necessary energy savings to have technical viability of the project. The propositions to get the energy savings are to improve the thermal insulation of the trailer and to limit the kind and amount of products to transport. Finally, to apply the technology of solar refrigeration in the cooling unit of the trailer to optimise its performance. (Author)

  1. Acceptance test report for the Westinghouse 100 ton hydraulic trailer

    International Nuclear Information System (INIS)

    Barrett, R.A.

    1995-01-01

    The SY-101 Equipment Removal System 100 Ton Hydraulic Trailer was designed and built by KAMP Systems, Inc. Performance of the Acceptance Test Procedure at KAMP's facility in Ontario, California (termed Phase 1 in this report) was interrupted by discrepancies noted with the main hydraulic cylinder. The main cylinder was removed and sent to REMCO for repair while the trailer was sent to Lampson's facility in Pasco, Washington. The Acceptance Test Procedure was modified and performance resumed at Lampson (termed Phase 2 in this report) after receipt of the repaired cylinder. At the successful conclusion of Phase 2 testing the trailer was accepted as meeting all the performance criteria specified

  2. High-capacity, high-strength trailer designs for the GA-4/GA-9 Casks

    International Nuclear Information System (INIS)

    Kissinger, J.A.; Rickard, N.D.; Taylor, C.; Zimmer, A.

    1991-01-01

    General Atomics (GA) is developing final designs for two dedicated legal-weight trailers to transport the GA-4 and GA-9 Spent-Fuel Casks. The basic designs for these high-capacity, high-strength trailers are essentially identical except for small modifications to account for the differences in cask geometry. We are designing both trailers to carry a 55,000 lb (24,900 kg) payload and to withstand a 2.5 g vertical design load. The GA-4 and GA-9 trailers are designed for significantly higher loads than are typical commercial semitrailers, which are designed to loads in the range of 1.7 to 2.0 g. To meet the federal gross vehicle weight limit for legal-weight trucks, GA has set a target design weight for the trailers of 9000 lb (4080 kg). This weight includes the personnel barrier, cask tiedowns, and impact limiter removal and storage system. Based on the preliminary trailer designs, the final design weight is expected to be very close to this target weight. 3 refs., 3 figs

  3. High-capacity, high-strength trailer designs for the GA-4/GA-9 casks

    International Nuclear Information System (INIS)

    Rickard, N.D.; Kissinger, J.A.; Taylor, C.; Zimmer, A.

    1991-01-01

    General Atomics (GA) is developing final designs for two dedicated legal-weight trailers to transport the GA-4 and GA-9 Spent-Fuel Casks. The basic designs for these high-capacity, high-strength trailers are essentially identical except for small modifications to account for the differences in cask geometry. The authors are designing both trailers to carry a 55,000 lb (24,900 kg) payload and to withstand a 2.5 g vertical design load. The GA-4 and GA-9 trailers are designed for significantly higher loads than are typical commercial semitrailers, which are designed to loads in the range of 1.7 to 2.0 g. To meet the federal gross vehicle weight limit for legal-weight trucks, GA has set a target design weight for the trailers of 9000 lb (4080 kg). This weight includes the personnel barrier, cask tiedowns, and impact limiter removal and storage system. Based on the preliminary trailer designs, the final design weight will to be very close to this target weight

  4. Acceptance test report for the Westinghouse 100 ton hydraulic trailer

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, R.A.

    1995-03-06

    The SY-101 Equipment Removal System 100 Ton Hydraulic Trailer was designed and built by KAMP Systems, Inc. Performance of the Acceptance Test Procedure at KAMP`s facility in Ontario, California (termed Phase 1 in this report) was interrupted by discrepancies noted with the main hydraulic cylinder. The main cylinder was removed and sent to REMCO for repair while the trailer was sent to Lampson`s facility in Pasco, Washington. The Acceptance Test Procedure was modified and performance resumed at Lampson (termed Phase 2 in this report) after receipt of the repaired cylinder. At the successful conclusion of Phase 2 testing the trailer was accepted as meeting all the performance criteria specified.

  5. Audience reaction movie trailers and the Paranormal Activity franchise

    OpenAIRE

    Alexander Swanson

    2015-01-01

    This article addresses the concept and growing practice of audience reaction movie trailers, specifically for films in the horror genre. Popularized by the Paranormal Activity series of films, these trailers primarily utilize green night-vision video footage of a movie theater audience reacting to the film being advertised, yet also consist of webcam recordings of screaming fans, documentary-style B-roll footage of audiences filing into preview screenings with high levels of anticipation, and...

  6. Towards a typology of video game trailers: Between the ludic and the cinematic

    Directory of Open Access Journals (Sweden)

    Jan Švelch

    2015-09-01

    Full Text Available This paper explores video game trailers, their various forms and the roles they play within video game industry and culture. It offers an overview of the current practice of video game trailer differentiation and proposes a new typology of video game trailers based on their relation to ludic and cinematic aspects of a video game, combining the theory of paratexts, video game performance framework, the interface effect concept, as well as the concept of transmedia storytelling. This typology reflects the historical evolution of a video game trailer and also takes into account current trends in the audiovisual paratexts of video games.

  7. Fleet Evaluation and Factory Installation of Aerodynamic Heavy Duty Truck Trailers

    Energy Technology Data Exchange (ETDEWEB)

    Beck, Jason; Salari, Kambiz; Ortega, Jason; Brown, Andrea

    2013-09-30

    The purpose of DE-EE0001552 was to develop and deploy a combination of trailer aerodynamic devices and low rolling resistance tires that reduce fuel consumption of a class 8 heavy duty tractor-trailer combination vehicle by 15%. There were 3 phases of the project: Phase 1 – Perform SAE Typed 2 track tests with multiple device combinations. Phase 2 – Conduct a fleet evaluation with selected device combination. Phase 3 – Develop the devices required to manufacture the aerodynamic trailer. All 3 phases have been completed. There is an abundance of available trailer devices on the market, and fleets and owner operators have awareness of them and are purchasing them. The products developed in conjunction with this project are at least in their second round of refinement. The fleet test undertaken showed an improvement of 5.5 – 7.8% fuel economy with the devices (This does not include tire contribution).

  8. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  9. Towards a typology of video game trailers: Between the ludic and the cinematic

    OpenAIRE

    Jan Švelch

    2015-01-01

    This paper explores video game trailers, their various forms and the roles they play within video game industry and culture. It offers an overview of the current practice of video game trailer differentiation and proposes a new typology of video game trailers based on their relation to ludic and cinematic aspects of a video game, combining the theory of paratexts, video game performance framework, the interface effect concept, as well as the concept of transmedia storytelling. This typology r...

  10. DOES FOOD SAFETY CONFLICT WITH FOOD SECURITY? THE SAFE CONSUMPTION OF FOOD

    OpenAIRE

    Kinsey, Jean D.

    2004-01-01

    This paper concludes by saying no, food safety and security reinforce each other. It combines food safety and food security into the concept of "safe food consumption." Unsafe food consumption occurs when food contains known substances that lead to short or long term illness or death (botulism) and suspect substances that are believed to lead to delayed diseases (pesticides). It also occurs when hunger or over eating contribute to long-term illness and shorter life expectancy. The costs of il...

  11. 78 FR 22941 - Sidump'r Trailer Company, Inc., Grant of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-04-17

    ...-28927; Notice 2] Sidump'r Trailer Company, Inc., Grant of Petition for Decision of Inconsequential...: Sidump'r Trailer Company, Inc. (Sidump'r) has determined that the rear impact guards on certain trailers...'r has filed an appropriate report pursuant to 49 CFR Part 573, Defect and Noncompliance...

  12. Audience reaction movie trailers and the Paranormal Activity franchise

    Directory of Open Access Journals (Sweden)

    Alexander Swanson

    2015-03-01

    Full Text Available This article addresses the concept and growing practice of audience reaction movie trailers, specifically for films in the horror genre. Popularized by the Paranormal Activity series of films, these trailers primarily utilize green night-vision video footage of a movie theater audience reacting to the film being advertised, yet also consist of webcam recordings of screaming fans, documentary-style B-roll footage of audiences filing into preview screenings with high levels of anticipation, and close-up shots of spectator facial expressions, accompanied by no footage whatsoever from the film being advertised. In analyzing these audience-centric promotional paratexts, my aim is to reveal them as attempting to sell and legitimize the experiential, communal, and social qualities of the theatrical movie viewing experience while at the same time calling for increased fan investment in both physical and online spaces. Through the analysis of audience reaction trailers, this article hopes to both join and engender conversations about horror fan participation, the nature of anticipatory texts as manipulative, and the current state of horror gimmickry in the form of the promotional paratext.

  13. Drag Reduction CFD Simulations and Flow Visualization of Light Vehicle-Trailer Systems

    Science.gov (United States)

    Sigurdson, Lorenz; Boyer, Henry; Lange, Carlos F.

    2016-11-01

    Experiments and CFD were performed to study the effect a deflector had on the flow and drag force associated with a 2010 F-150 truck and cargo trailer Light Vehicle-Trailer System (LVTS). Image Correlation Velocimetry (ICV) on smokewire streaklines measured the velocity field on the model mid-plane. CFD estimated the drag reduction as 13% at a Re of 14,900 with a moving ground-plane, and 17% without. Experiments suggested that the low Re does not diminish the full-scale relevance of the drag reduction results. One low Re effect was the presence of a separation bubble on the hood of the tow vehicle whose size reduced with an increase in Re. Three other characteristic flow patterns were identified: separation off the lead vehicle cab, stagnation of the free-stream on the trailer face for the no-deflector case, and subsequent separation at the trailer front corner. Comparisons of the ICV and CFD results with no deflector indicated good agreement in the direction of the velocity vectors, and the smoke streaklines and CFD streamlines also agreed well. However, for the deflector case, the CFD found an entirely different topological solution absent in the experiment. A pair of vertically-oriented mid-plane vortices were wrapped around the front of the trailer. Support from the Canadian Natural Sciences and Engineering Research Council Grant 41747 is gratefully acknowledged.

  14. SmartWay Mark Signature Page: Tractors & Trailers

    Science.gov (United States)

    This SmartWay agreement is for companies and organizations who wish to comply with the SmartWay Graphic Standards and Usage Guide guidelines and requirements for using the SmartWay logos on SmartWay designated Tractors and Trailers.

  15. Art of anticipation : the artistic status of the film trailer and its place in a wider cinematic culture

    OpenAIRE

    Hesford, Daniel William

    2013-01-01

    Close association with, and proximity to, a culture of commercialism means film trailers are often overlooked in academic analyses of cinema. Trailers are, for many audiences, simply adverts: disposable, consumable and not 'worthy' of the critical attention paid to the their feature-length antecedents. Yet trailers' undeniable impact on spectators generates a spectrum of reactions which contradicts the often dismissive and negative reception with which they are met. Trailers ...

  16. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    Science.gov (United States)

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  17. Multiple application coded switch development report

    International Nuclear Information System (INIS)

    Bernal, E.L.; Kestly, J.D.

    1979-03-01

    The development of the Multiple Application Coded Switch (MACS) and its related controller are documented; the functional and electrical characteristics are described; the interface requirements defined, and a troubleshooting guide provided. The system was designed for the Safe Secure Trailer System used for secure transportation of nuclear material

  18. Neither International nor Global: Rethinking the Problematic Subject of Security

    Directory of Open Access Journals (Sweden)

    David Chandler

    2010-09-01

    Full Text Available This paper argues that the problematic of the international and the global has been a barrier to understanding the transformation of security discourse over the last decade. Academic treatments of security within the discipline of international relations have been structured by the traditional liberal binaries, which conceive of political communities capable of constituting securing subjects at either the level of the state or the global. Today’s dominant framing of the security problematic seems to evade easy articulation within this structure and in some readings is seen to presage a transitory stage from the international to the global. An alternative reading is sketched out here, that of the post- liberal, which suggests that the apparent shift towards the global can not be captured from within the liberal problematic and highlights that rather than traditional disagreements over the nature of the subject of security – the constitution of the securing actor – we are witnessing the disappearance of securing agency itself.

  19. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  20. Analysis of a fictive active e- trailer

    NARCIS (Netherlands)

    Gudo Ebbers; ir. F.G. Rieck; Steven Boonstra

    2017-01-01

    Trucks, consume an enormous amount of diesel annually and contribute greatly to the total CO2 emission around the world. Electrification of these freight vehicles will lead to reduction of fuel consumption and CO2 emission. Trailers as part of heavy freight vehicles are a great opportunity for

  1. X-Ray imager power source on distribution trailers

    International Nuclear Information System (INIS)

    Johns, B.R.

    1996-01-01

    This Acceptance for Beneficial Use documents the work completed on the addition of an X-ray cable reel on distribution trailer HO-64-3533 for core sampling equipment. Work and documentation remaining to be completed is identified

  2. Enhanced methods for operating refueling station tube-trailers to reduce refueling cost

    Science.gov (United States)

    Elgowainy, Amgad; Reddi, Krishna

    2017-08-22

    A method and apparatus are provided for operating a refueling station including source tube-trailers and at least one compressor to reduce refueling cost. The refueling station includes a gaseous fuel supply source including a plurality of tanks on a tube trailer coupled to a first control unit, and high pressure buffer storage having predefined capacity coupled to a second control unit and the first tanks by a pressure control valve and the first control unit, and at least one compressor. The refueling station is operated at different modes depending on a state of the refueling station at the beginning of each operational mode. The refueling system is assessed at the end of each operational mode to identify the state of the system and select a next mode of operation. The operational modes include consolidating hydrogen, or any gaseous fuel, within the tubes mounted on the trailer.

  3. Cost Analysis Of Replacement And Bearing Trailer Maintenance In Sugar Group Companies

    OpenAIRE

    Mastur, Mastur; Masyhuri, Masyhuri; Waluyati, Lestari Rahayu

    2017-01-01

    The purpose of this study are to understand (i) the costs and periods optimal of grease used for the replacement and maintenance bearing trailer in Sugar Group Companies (SGC), and (ii) the effect of a period and frequency of grease, lifetime bearing, frequency of replacement bearing in a year, unit trailer, brand bearing, and location of plant. The basic method used is descriptive and analytical. The location determined were in Workshop Division PT. ILP, PT. SIL, and PT. GPM. The analytical ...

  4. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  5. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  6. Tyre induced vibrations of the car-trailer system

    Science.gov (United States)

    Beregi, S.; Takács, D.; Stépán, G.

    2016-02-01

    The lateral and yaw dynamics of the car-trailer combination are analysed by means of a single track model. The equations of motion are derived rigorously by means of the Appell-Gibbs equations for constant longitudinal velocity of the vehicle. The tyres are described with the help of the so-called delayed tyre model, which is based on a brush model with pure rolling contact. The lateral forces and aligning torques of the tyre/road interaction are calculated via the instantaneous lateral deformations in the contact patches. The linear stability analysis of the rectilinear motion is performed via the analytically determined characteristic function of the system. Stability charts are constructed with respect to the vehicle longitudinal velocity and the payload position on the trailer. Self-excited lateral vibrations are detected with different vibration modes at low and at high longitudinal speeds of the vehicle. The effects of the tyre parameters are also investigated.

  7. Diesel generator trailer acceptance test procedure

    International Nuclear Information System (INIS)

    Kostelnik, A.J.

    1994-01-01

    This Acceptance Test Procedure (ATP) will document compliance with the requirements of WHC-S-0252 Rev. 1 and ECNs 609271, and 609272. The equipment being tested is a 150KW Diesel Generator mounted on a trailer with switchgear. The unit was purchased as a Design and Fabrication procurement activity. The ATP was written by the Seller and will be performed by the Seller with representatives of the Westinghouse Hanford Company witnessing the test at the Seller's location

  8. Breathing air trailer acceptance test report

    International Nuclear Information System (INIS)

    Kostelnik, A.J.

    1996-01-01

    This Acceptance Test Report documents compliance with the requirements of specification WHC-S-0251, Rev.0 and ECNs 613530 and 606113. The equipment was tested according to WHC-SD-WM-ATP-104. The equipment tested is a Breathing Air Supply Trailer purchased as a design and fabrication procurement activity. The ATP was written by the Seller and was performed by the Seller with representatives of the Westinghouse Hanford Company witnessing portions of the test at the Seller's location

  9. Protecting the Home and Adequate Housing - Living in a Caravan or Trailer as a Human Right

    NARCIS (Netherlands)

    Donders, Y.

    2016-01-01

    Many Roma, gypsies and travellers live in caravans or trailers, sometimes in together trailer parks or camps. This article analyses how this specific lifestyle connected to their housing is protected under the various regimes and provisions of international human rights law. Home and adequate

  10. Trailers in between short video forms from digital games to movies and back

    OpenAIRE

    Gandolfi, Enrico; Semprebene, Roberto

    2017-01-01

    Promotional trailers represent a significant trend in most entertainment sectors. However, little efforts have been done in enlightening this expressive form when related to video games. This article aims to address such a lack by analyzing game/movie (inspired by digital games) trailers as a crossroad between digital entertainment and films. The main intent is to exploit a comparative lens to uncover leading traits of short videos according to the medium that that they are portraying. Theref...

  11. An investigation of drag reduction for tractor trailer vehicles with air deflector and boattail. [wind tunnel tests

    Science.gov (United States)

    Muirhead, V. U.

    1981-01-01

    A wind tunnel investigation was conducted to determine the influence of several physical variables on the aerodynamic drag of a trailer model. The physical variables included: a cab mounted wind deflector, boattail on trailer, flow vanes on trailer front, forced transition on trailer, and decreased gap between tractor and trailer. Tests were conducted at yaw angles (relative wind angles) of 0, 5, 10, 20, and 30 degrees and Reynolds numbers of 3.58 x 10 to the 5th power 6.12 x 10 to the 5th power based upon the equivalent diameter of the vehicles. The wind deflector on top of the cab produced a calculated reduction in fuel consumption of about 5 percent of the aerodynamic portion of the fuel budget for a wind speed of 15.3 km/hr (9.5 mph) over a wind angle range of 0 deg to 180 deg and for a vehicle speed of 88.5 km/hr (55 mph). The boattail produced a calculated 7 percent to 8 percent reduction in fuel consumption under the same conditions. The decrease in gap reduced the calculated fuel consumption by about 5 percent of the aerodynamic portion of the fuel budget.

  12. Compressed air piping, 241-SY-101 hydraulic pump retrieval trailer

    International Nuclear Information System (INIS)

    Wilson, T.R.

    1994-01-01

    The following Design Analysis was prepared by the Westinghouse Hanford Company to determine pressure losses in the compressed air piping installed on the hydraulic trailer for the 241-SY-101 pump retrieval mission

  13. Computational Flow Modeling of a Simplified Integrated Tractor-Trailer Geometry

    International Nuclear Information System (INIS)

    Salari, K.; McWherter-Payne, M.

    2003-01-01

    For several years, Sandia National Laboratories and Lawrence Livermore National Laboratory have been part of a consortium funded by the Department of Energy to improve fuel efficiency of heavy vehicles such as Class 8 trucks through aerodynamic drag reduction. The objective of this work is to demonstrate the feasibility of using the steady Reynolds-Averaged Navier-Stokes (RANS) approach to predict the flow field around heavy vehicles, with special emphasis on the base region of the trailer, and to compute the aerodynamic forces. In particular, Sandia's computational fluid dynamics code, SACCARA, was used to simulate the flow on a simplified model of a tractor-trailer vehicle. The results are presented and compared with NASA Ames experimental data to assess the predictive capability of RANS to model the flow field and predict the aerodynamic forces

  14. 17 CFR 229.1008 - (Item 1008) Interest in securities of the subject company.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1008) Interest in securities of the subject company. 229.1008 Section 229.1008 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  15. Least Limiting Water Range and Load Bearing Capacity of Soil under Types of Tractor-Trailers for Mechanical Harvesting of Green Sugarcane

    Directory of Open Access Journals (Sweden)

    Antonio Higino Frederico Pereira

    2015-12-01

    Full Text Available ABSTRACT The expansion of the sugarcane industry in Brazil has intensified the mechanization of agriculture and caused effects on the soil physical quality. The purpose of this study was to evaluate the limiting water range and soil bearing capacity of a Latossolo Vermelho distroférrico típico (Rhodic Hapludox under the influence of different tractor-trailers used in mechanical sugarcane harvesting. The experiment was arranged in a randomized block design with five replications. The treatments consisted of green sugarcane harvesting with: harvester without trailer (T1; harvester with two trailers with a capacity of 10 Mg each (T2; harvester with trailer with a capacity of 20 Mg (T3 and harvester and truck with trailer with a capacity of 20 Mg (10 Mg per compartment (T4. The least limiting water range and soil bearing capacity were evaluated. The transport equipment to remove the harvested sugarcane from the field (trailer at harvest decreased the least limiting water range, reducing the structural soil quality. The truck trailer caused the greatest impact on the soil physical properties studied. The soil load bearing capacity was unaffected by the treatments, since the pressure of the harvester (T1 exceeded the pre-consolidation pressure of the soil.

  16. Radioisotope Thermoelectric Generator Transport Trailer System

    International Nuclear Information System (INIS)

    Ard, K.E.; King, D.A.; Leigh, H.; Satoh, J.A.

    1994-01-01

    The Radioisotope Thermoelectric Generator (RTG) Transportation System, designated as System 100, comprises four major systems. The four major systems are designated as the Packaging System (System 120), Trailer System (System 140), Operations and Ancillary Equipment System system 160), and Shipping and Receiving Facility Transport System (System 180). Packaging System (System 120), including the RTG packaging is licensed (regulatory) hardware; it is certified by the US Department of Energy to be in accordance with Title 10, Code of federal Regulations, Part 71 (10 CFR 71). System 140, System 160, and System 180 are nonlicensed (nonregulatory) hardware

  17. Astronaut Neil Armstrong in Launch Complex 16 trailer during suiting up

    Science.gov (United States)

    1966-01-01

    Astronaut Neil A. Armstrong, command pilot of the Gemini 8 space flight, sits in the Launch Complex 16 trailer during suiting up operations for the Gemini 8 mission. Suit technician Jim Garrepy assists.

  18. 49 CFR 393.118 - What are the rules for securing dressed lumber or similar building products?

    Science.gov (United States)

    2010-10-01

    ... plywood, gypsum board or other materials of similar shape. Lumber or building products which are not... the middle tier that must be secured may not exceed 6 feet about the deck of the trailer; or (ii...

  19. Mickey’s Trailer and Environmental Thought

    DEFF Research Database (Denmark)

    Goddard, Joseph

    2016-01-01

    International Park, which promotes motor-tourism and automobile ownership, and Ben Sharpsteen’s other work for Walt Disney. The article also examines the ideas of physical and “illusional” zoning in the city, especially the way that they were applied in the mid-twentieth century. Physical zoning involved...... separating incompatible land uses, whereas illusional zoning entailed seeing what you wanted to see. What does Mickey’s Trailer say about how people can live, and can it inform where people choose to live? The essay muses that appreciations of nature and the environment are influenced by popular culture....

  20. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  1. Definition of the «Economic Security of an Enterprise» and «Safe Development of an Enterprise» Notions

    Directory of Open Access Journals (Sweden)

    Yefimova Ganna V.

    2013-11-01

    Full Text Available The necessity of this study is explained by difference of opinions regarding understanding of the “economic security of an enterprise” notion, on the one hand, and the poorly studied issue of a combination of the process of enterprise development with a necessary task of ensuring a high level of its economic security, on the other hand. Analysing, systemising and generalising results of scientific studies, the article identifies that economic security of an enterprise is an economic category, which characterises the enterprise functioning conditions. Favourable conditions of functioning ensure a high level of stability and steadiness of an enterprise and its ability of self-realisation and expanded self-reproduction. This becomes possible if an enterprise is capable of resisting external threats and preventing internal ones. Since development of an enterprise is an objective process, which takes place under conditions of uncertainty and changeability of external and internal environments, it is accompanied with a system of threats, which the system of economic security should protect an enterprise from. Taking into account the above, safe development of an enterprise is a process of consecutive transitions of the economic system from one state to another, which is not of a poorer quality than a previous one, which envisages producing new goals and creation of safe conditions for transition from one specific goal, achieved in the process of enterprise functioning, to another. The proposed definitions allow consideration of such significant issues of methodology of management of safe development of an enterprise as the diagnostics of its level and planning.

  2. 49 CFR 393.5 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... metal chain that are packaged as a roll, coil, spool, wind, or wrap, including plastic or rubber coated... SAFE OPERATION General § 393.5 Definitions. As used in this part, the following words and terms are... capacity of all devices used to secure an article of cargo on a vehicle. Agricultural commodity trailer. A...

  3. Establishing Trailer Ventilation (Boarding) Requirements for Finishing Pigs during Transport.

    Science.gov (United States)

    McGlone, John; Sapkota, Avi; Johnson, Anna; Kephart, Rebecca

    2014-08-19

    Specifically, this study aimed to establish the effects on mortality and morbidity of boarding levels (amount of side-wall trailer ventilation) for finishing pigs in mild weather (8.80 ± 0.30 °C, 71.70% ± 1.12% humidity). Pigs from commercial finishing sites were transported in 302 pot-bellied trailers to commercial processing plants. Measures collected at the processing plant were rates of dead on arrival (DOA), non-ambulatory, non-injured (NANI), non-ambulatory, injured (NAI), and total dead and down (D&D). Boarding levels (% that side walls were closed off with inserted boards) were divided into 3 bins: low, medium, and high, and outside temperature was divided into 4 bins 15 °C. Average rates of DOA, NANI, NAI, and D&D were approximately 0.30%, 0.12%, 0.04%, and 0.46%, respectively. The D&D was highest when boarding level was low with temperatures boarding level (medium and high boarding) in the temperature range of 5.10 °C to 23.30 °C did not affect pig losses.

  4. Advertising Citizen Science: A Trailer for the Citizen Sky Project

    Science.gov (United States)

    Wyatt, Ryan; Price, A.

    2012-01-01

    Citizen Sky is a multi-year, NSF funded citizen science project involving the bright and mysterious variable star epsilon Aurigae. The project was conceived by the IYA 2009 working group on Research Experiences for Students, Teachers, and Citizen-Scientists. Citizen Sky goes beyond simple observing to include a major data analysis component, introducing participants to the full scientific process from background research to paper writing for a peer-reviewed journal. As a means of generating interest in the project, the California Academy of Sciences produced a six-minute "trailer” formatted for both traditional and fulldome planetariums as well as HD and web applications. This talk will review the production process for the trailer as well as the methods of distribution via planetariums, social media, and other venues_along with an update on the Citizen Sky Project as a whole. We will show how to use a small, professionally-produced planetarium trailer to help spread word on a citizen science project. We will also show preliminary results on a study about how participation level/type in the project affects science learning.

  5. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  6. Analytical approach to determine vertical dynamics of a semi-trailer truck from the point of view of goods protection

    Science.gov (United States)

    Pidl, Renáta

    2018-01-01

    The overwhelming majority of intercontinental long-haul transportations of goods are usually carried out on road by semi-trailer trucks. Vibration has a major effect regarding the safety of the transport, the load and the transported goods. This paper deals with the logistics goals from the point of view of vibration and summarizes the methods to predict or measure the vibration load in order to design a proper system. From these methods, the focus of this paper is on the computer simulation of the vibration. An analytical method is presented to calculate the vertical dynamics of a semi-trailer truck containing general viscous damping and exposed to harmonic base excitation. For the purpose of a better understanding, the method will be presented through a simplified four degrees-of-freedom (DOF) half-vehicle model, which neglects the stiffness and damping of the tires, thus the four degrees-of-freedom are the vertical and angular displacements of the truck and the trailer. From the vertical and angular accelerations of the trailer, the vertical acceleration of each point of the platform of the trailer can easily be determined, from which the forces acting on the transported goods are given. As a result of this paper the response of the full platform-load-packaging system to any kind of vehicle, any kind of load and any kind of road condition can be analyzed. The peak acceleration of any point on the platform can be determined by the presented analytical method.

  7. 76 FR 73763 - Parts and Accessories Necessary for Safe Operation; Grant of Temporary Exemption for Innovative...

    Science.gov (United States)

    2011-11-29

    ... an exemption to allow commercial motor vehicle operators to use trailer-mounted electric brake... commercial motor vehicle operators to tow trailers equipped with trailer-mounted electric brake controllers... vehicle weight (GVW) of a trailer equipped with a trailer-mounted electric brake controller may be used...

  8. Improvement of the directional stability of passenger car trailer couplings with actively controlled steering

    Science.gov (United States)

    Desens, Jens

    The stabilization of pendulum oscillations of passenger car trailer couplings, using active steering, was examined. A linear model of the couplings was presented. Each axle was provided with a controller. The controllers were optimized, with regard to necessary sensors, in order to minimize costs. The rear and the front axles were provided with a control unit in order to compute the potential prevailing in the active steering of several axles. It was shown that the passenger car rear axle was the most suitable for coupling stabilization. The experiment was simulated, using a complex coupling model. The developed controller allowed the passenger car trailer to be driven at a speed higher than 150 km per hour.

  9. Department of Energy (DOE) system for the transportation of strategic quantities of special nuclear material (SQ SNM)

    International Nuclear Information System (INIS)

    Dickason, D.P.

    1978-01-01

    Since 1947 DOE and its predecessor agencies, AEC and ERDA, have moved nuclear materials by a variety of commercial and government transportation modes. In the late 1960's world-wide terrorism and other dissident activities prompted the then-AEC to review its procedures for safeguarding SNM. These reviews resulted in immediate and long-range programs for improvement of overall safeguards. Domestic transportation of completed nuclear weapons and SNM used in the weapons program was selected for special consideration. In the early 1970's AEC started the development of a Safe Secure Trailer (SST) to transport nuclear weapons and nuclear components and the development and installation of a high frequency (HF) communications system to assure continuous radio contact between selected highway and rail shipments and Headquarters, Albuquerque Operations (ALO). Late 1974 AEC directed ALO to develop a transportation system to extend weapons-level protection to all AEC SQ SNM shipments and to consolidate, manage, and operate this system. As of September 1976 all SQ SNM was being transported in the Safe Secure DOE (then ERDA) transportation safeguards system, composed of the following principal elements: (1) Transport equipment consisting of Safe Secure Trailers and specially modified towing tractors; Safe Secure Railcars and specially modified escort coaches; and specially designed highway escort vehicles. (2) An automated high-frequency digital radio system that enables continuous communications between the transporting equipment and central control. (3) A courier force that operates all transport equipment (except aircraft and rail power units) and mobile communications equipment; provides armed protection for shipments; and assures proper safety en route. (4) A central Headquarters staff that plans, executes, and controls shipments and directs, manages, and operates the system

  10. Comparative injury, adipose fin mark quality, and tag retention of spring Chinook Salmon marked and coded wire tagged by an automated trailer and manual trailer at Carson National Fish Hatchery: October 2008

    Data.gov (United States)

    Department of the Interior — The United States Fish and Wildlife Service’s Columbia River Fisheries Program Office has been marking and tagging salmon with automated trailers consistently since...

  11. Types of adaptation of the system of enterprise economic security to the impact of subjects of tax regulation

    Directory of Open Access Journals (Sweden)

    Pohorelov Yurii S.

    2014-01-01

    Full Text Available The article offers the authors’ approach to identification of types of adaptation of the system of enterprise economic security to negative influence of subjects of tax regulation. It determines composition of these subjects and, separately, regulation subjects that form fundamental grounds of the tax sphere and subjects of effective influence, which directly interact with entrepreneurial structures and realise tax regulation of their activity in practice. As regards direct adaptation of the system of enterprise economic security, the article offers to mark out its individual types with respect to the set goal, essence of changes in the system of economic security, degree of its manageability and nature of accumulated changes. Moreover, the article offers a list of catalysts and inhibitors of adaptation of the system of enterprise economic security to impact of subjects of tax regulation. It also marks out adaptation parameters of the system of enterprise economic security to the impact of subjects of tax regulation and provides their gradations.

  12. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  13. Performance-based analysis of current South African semi-trailer designs

    CSIR Research Space (South Africa)

    Thorogood, R

    2009-07-01

    Full Text Available , performance based standards, dynamic stability, tractor semi- trailers, directional response, static rollover threshold Introduction South African heavy vehicles are currently designed according to prescriptive standards designed and enforced... productivity. These include Central Tyre Inflation (CTI), on-board weighing, new materials such as Domex and vehicle satellite tracking, all leading towards increased payloads and reduced costs. There have also been improvements in technology...

  14. Experience with ANSI N14.30 for in-service inspections of semi-trailer used for spent fuel shipments

    International Nuclear Information System (INIS)

    Hirtz, G.J.

    1998-05-01

    On July 18, 1996, the Oak Ridge National Laboratory (ORNL) resumed shipping spent fuel in interstate commerce after a 10 year suspension of this activity. This shipment was conducted using a Nuclear Regulatory Commission licensed spent fuel transport package purchased from General Electric Company by ORNL for the purpose of moving High Flux Isotope Reactor spent fuel to the Savannah River Site. The trailer, fabricated to the ANSI N14.30, Semi-Trailers Employed in the Highway Transport of Weight Concentrated Radioactive Loads Design, Fabrication, and Maintenance, has recently undergone its first scheduled in-service inspection. This paper presents the experience gained from interpretation and application of the ANSI N14.30 standard focusing on the in-service inspection for the structure of the trailer. Initially, the term weight concentrated is illustrated giving detail to the location and center of gravity of the 33,500 pound shipping container and forces induced by the tie down system. Basic information about the design stresses and initial testing provided by the manufacturer are used as a lead-in to the requirements of the standard. The task of examining the trailer structure provided many lessons and required considerable effort. All of the support personnel were provided by ORNL; the garage mechanics and the certified inspection engineers had never been involved in applying ANSI N14.30. Other obstacles were the lack of existing inspection procedures for this particular activity and the lack of a previous experience interpreting the standard with regard to repair work. Some of these questions were resolved by clarification received from the writers of the standard, and others were resolved by the teamwork between the manufacturer and ORNL. This experience illustrated the importance of the trailer manufacturer as a participant in the decisions made concerning in-service inspection and maintenance

  15. Keeping Students Safe: Introducing the Monolithic Dome

    Science.gov (United States)

    Lanham, Carol

    2009-01-01

    The tiny town of Niangua, Missouri, made national headlines in 2008 when a rare cluster of winter tornadoes tore across the state on an unseasonably warm January night. The twisters killed a Niangua woman in her trailer home and destroyed numerous other structures. News photos of the trailer debris were a sobering reminder of the vulnerability of…

  16. Video Book Trailers: Coming to a Library Near You! Spotlight Feature

    Science.gov (United States)

    Dopke-Wilson, MariRae

    2009-01-01

    This article features two library media specialists who discovered a way to motivate high school students to read. When most people go to the movies, the "coming attractions" or movie trailers are as anticipated as the popcorn! This Americana movie tradition hooks people again and again on what they will come back to see next. So, it's no surprise…

  17. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  18. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  19. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  20. Trailer microclimate and calf welfare during fall-run transportation of beef calves in Alberta.

    Science.gov (United States)

    Goldhawk, C; Janzen, E; González, L A; Crowe, T; Kastelic, J; Pajor, E; Schwartzkopf-Genswein, K S

    2014-11-01

    Twenty-four commercial loads of beef calves (BW 300 ± 52 kg, mean ± SD) were evaluated for associations among transportation factors, in-transit microclimate, and calf welfare. Transport factors evaluated included vehicle speed, space allowance, compartment within trailer, and transit duration. Calves were transported for 7 h 44 min ± 4 h 15 min, with space allowances ranging from 0.56 to 1.17 m(2)/animal. Compartment within trailer, space allowance, and vehicle speed did not affect the difference between compartment ceiling-level and ambient temperatures during a 30-min period of steady-state microclimate. During the steady-state period, a 1°C increase in ambient temperature above the mean of 5.6°C was associated with a 0.62°C decrease in the difference between ceiling-level and ambient temperature (P ratio; P profitability and calf welfare.

  1. 41 CFR 302-7.20 - If my HHG shipment includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight...

    Science.gov (United States)

    2010-07-01

    ... includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight additive is assessed by the...) General Rules § 302-7.20 If my HHG shipment includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight additive is assessed by the HHG carrier, am I responsible for payment? If your HHG...

  2. TRAILER Project Overview. Tagging, Recognition and Acknowledgment of Informal Learning ExpeRiences

    NARCIS (Netherlands)

    García-Peñalvo, Francisco J.; Zangrando, Valentina; García Holgado, Alicia; Conde González, Miguel Ángel; Seoane Pardo, Antonio; Alier Forment, Marc; Janssen, José; Griffiths, Dai; Mykowska, Aleksandra; Ribeiro Alves, Gustavo; Minovic, Miroslav

    2012-01-01

    García-Peñalvo, F. J., Zangrando, V., García Holgado, A., Conde González, M. Á., Seoane Pardo, A. M., Alier Forment, M., Janssen, J., et al. (2012). TRAILER Project Overview. Tagging, Recognition and Acknowledgment of Informal Learning ExpeRiences. In F. J. García, L. Vicent, M. Ribó, A. Climent, J.

  3. Computational Analysis of a South African Mobile Trailer-Type Medium Sized Tyre Test Rig

    CSIR Research Space (South Africa)

    Sharma, Shikar

    2015-04-01

    Full Text Available To support the South African National Defence Force with their vehicle mobility needs, the CSIR has begun characterising tyres by using a medium, trailer-type, tyre test rig. Two different Pacejka tyre models were generated using two independent...

  4. Effect of Uphill Flexible Pavements on The Damaging Effect Of Full-Trailer Trucks With Tandem Front Axles

    Directory of Open Access Journals (Sweden)

    Sabah Said Razouki

    2017-08-01

    Full Text Available The effect of traffic on flexible pavements can be expressed in terms of truck equivalence factors. This paper presents a study on the effect of uphill pavements on the damaging effect (truck equivalence factors of two types of full-trailer trucks with tandem front axles. Axle load and geometrical characteristics survey on the two types of full-trailer trucks were carried out for determining the data needed in this study. In addition, uphill slope survey in Kerbala city was done and the data of uphill slope of other Iraqi cities were obtained from previous surveys. The paper reveals that the uphill pavement gradient causes significant increase in truck equivalence factors. In addition, the research reveals that there are many factors affecting the truck equivalence factors on uphill flexible pavements, including the total weight of full-trailer, H/B ratio (height of center of gravity to the wheel base of the truck, magnitude of uphill slope, and the structural number (SN.This work shows the importance of considering the effect of uphill slope in the design of flexible pavements on steep uphill slopes.

  5. Reducing heat transfer across the insulated walls of refrigerated truck trailers by the application of phase change materials

    International Nuclear Information System (INIS)

    Ahmed, Mashud; Meade, Oliver; Medina, Mario A.

    2010-01-01

    A general estimate shows that 80% of communities across the United States receive their goods exclusively by transport trucks, of which a significant number are climate-controlled because they carry perishable goods, pharmaceutical items and many other temperature-sensitive commodities. Keeping the inside of a truck trailer at a constant temperature and relative humidity requires exact amounts of heat and/or moisture management throughout the shipment period, which is regulated via small refrigeration units, placed outside the truck, that operate by burning fuel. These trucks, known as refrigerated truck trailers, are the focus of this paper. In the research presented herein, the conventional method of insulation of the refrigerated truck trailer was modified using phase change materials (PCMs). The limited research carried out in refrigerated transport compared to other refrigeration processes has left spaces for innovative solutions in this area. The research investigated the inclusion of paraffin-based PCMs in the standard trailer walls as a heat transfer reduction technology. An average reduction in peak heat transfer rate of 29.1% was observed when all walls (south, east, north, west, and top) were considered. For individual walls, the peak heat transfer rate was reduced in the range of 11.3-43.8%. Overall average daily heat flow reductions into the refrigerated compartment of 16.3% were observed. These results could potentially translate into energy savings, pollution abatement from diesel-burning refrigeration units, refrigeration equipment size reduction, and extended equipment operational life. The research and its results will help to better understand the scope of this technology.

  6. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  7. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  8. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  9. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.J.; Bastiaansen, H.J.M.; Berg, J. van den; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two bigchallenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  10. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  11. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.; Bastiaansen, H.; Van den Berg, J.; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  12. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  13. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  14. Novel method for on-road emission factor measurements using a plume capture trailer.

    Science.gov (United States)

    Morawska, L; Ristovski, Z D; Johnson, G R; Jayaratne, E R; Mengersen, K

    2007-01-15

    The method outlined provides for emission factor measurements to be made for unmodified vehicles driving under real world conditions at minimal cost. The method consists of a plume capture trailer towed behind a test vehicle. The trailer collects a sample of the naturally diluted plume in a 200 L conductive bag and this is delivered immediately to a mobile laboratory for subsequent analysis of particulate and gaseous emissions. The method offers low test turnaround times with the potential to complete much larger numbers of emission factor measurements than have been possible using dynamometer testing. Samples can be collected at distances up to 3 m from the exhaust pipe allowing investigation of early dilution processes. Particle size distribution measurements, as well as particle number and mass emission factor measurements, based on naturally diluted plumes are presented. A dilution profile relating the plume dilution ratio to distance from the vehicle tail pipe for a diesel passenger vehicle is also presented. Such profiles are an essential input for new mechanistic roadway air quality models.

  15. Security evaluation and design of structures subjected to blast loading

    OpenAIRE

    Pereira, João Miguel

    2014-01-01

    Tese de doutoramento em Engenharia Civil The work presented in this thesis was developed at the Department of Civil Engineering of University of Minho. This work involves experimental and numerical campaigns and intends to give a contribution for a better understanding of the effect of explosions. Blast loading is a subject of much actuality and considerable lack of expertise. Europe has never been so rich and safe, where the violent years of the first half of the 20th centu...

  16. Piezoelectric-based actuators for improved tractor-trailer performance (Conference Presentation)

    Science.gov (United States)

    Menicovich, David; Amitay, Michael; Gallardo, Daniele

    2017-04-01

    The application of piezo-electrically-driven synthetic-jet-based active flow control to reduce drag on tractor-trailers and to improve thermal mixing in refrigerated trailers was explored on full-scale tests. The active flow control technique that is being used relies on a modular system comprised of distributed, small, highly efficient actuators. These actuators, called synthetic jets, are jets that are synthesized at the edge of an orifice by a periodic motion of a piezoelectric diaphragm(s) mounted on one (or more) walls of a sealed cavity. The synthetic jet is zero net mass flux (ZNMF), but it allows momentum transfer to flow. It is typically driven near diaphragm and/or cavity resonance, and therefore, small electric input [O(10W)] is required. Another advantage of this actuator is that no plumbing is required. The system doesn't require changes to the body of the truck, can be easily reconfigured to various types of vehicles, and consumes small amounts of electrical power from the existing electrical system of the truck. The actuators are operated in a closed feedback loop based on inputs received from the tractor's electronic control unit, various system components and environmental sensors. The data are collected and processed on-board and transmitted to a cloud-based data management platform for further big data analytics and diagnostics. The system functions as a smart connected product through the interchange of data between the physical truck-mounted system and its cloud platform.

  17. El book trailer en la promoción del relato

    OpenAIRE

    Tabernero Sala, Rosa

    2013-01-01

    El book trailer se está instaurando en el ámbito de la literatura infantil y juvenil, especialmente en lo que concierne al álbum y al libro ilustrado, como un instrumento de promoción del libro con unos recursos narrativos dignos de estudio en lo que concierne a la formación de lectores. Los objetivos de la investigación presentada son los siguientes: aislar y establecer las circunstancias de diversa procedencia que han originado la presencia de este recurso en el ámbito de la Literatura Infa...

  18. Fuel Economy and Emissions Effects of Low Tire Pressure, Open Windows, Roof Top and Hitch-Mounted Cargo, and Trailer

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, John F [ORNL; Huff, Shean P [ORNL; West, Brian H [ORNL

    2014-01-01

    To quantify the fuel economy (FE) effect of some common vehicle accessories or alterations, a compact passenger sedan and a sport utility vehicle (SUV) were subjected to SAE J2263 coastdown procedures. Coastdowns were conducted with low tire pressure, all windows open, with a roof top or hitch-mounted cargo carrier, and with the SUV pulling an enclosed cargo trailer. From these coastdowns, vehicle dynamometer coefficients were developed which enabled the execution of vehicle dynamometer experiments to determine the effect of these changes on vehicle FE and emissions over standard drive cycles and at steady highway speeds. The FE penalty associated with the rooftop cargo box mounted on the compact sedan was as high as 25-27% at higher speeds, where the aerodynamic drag is most pronounced. For both vehicles, use of a hitch mounted cargo tray carrying a similar load resulted in very small FE penalties, unlike the rooftop cargo box. The results for the SUV pulling a 3500 pound enclosed cargo trailer were rather dramatic, resulting in FE penalties ranging from 30%, for the city cycle, to 50% at 80 mph, at which point significant CO generation indicated protective enrichment due to high load. Low tire pressure cases resulted in negligible to 10% FE penalty depending on the specific case and test point. Driving with all four windows open decreased FE by 4-8.5% for the compact sedan, and 1-4% for the SUV.

  19. Concept Design of Trailor Ferry Service to Carry 150 Trailers Between Jacksonville, FL and Bridgeport, CT of USA

    Science.gov (United States)

    Sindagi, S. C.; Sandhu, B. S.

    2015-04-01

    With the increased load on highways, today there is a need to develop alternate ways to transport goods within the sovereignty. The use of ships to transport goods has always been the primary method of transporting goods across the seas but it can also be used to transport goods within the country. This way we can reduce the load on highways which at this point of time serve as the primary method of transportation. Worldwide very few ferries are in operation which transports 100-150 Trailers between two ports. Catching on this opportunity for design, construction and operation of vessels, a survey for possible routes in United States of America which will transport 150 Trailers has been conducted by various authorities and organizations. The challenge here is to determine the parameters of the vessel and design a fleet of vessels that could carry trailers along with their tractors within the least possible time and in with least possible freight between Jacksonville, FL and Bridgeport, CT of United States of America. The primary aim of the work presented here is to propose a design with fleet in such a way that each day 150 trailers could be loaded and unloaded at each of the two mentioned ports. An analysis of the route between the ports brought out various primary parameters like the distance, weather, different load lines to be encountered and also several size constraints that the vessel needs to adhere to, in order to ply smoothly on this route. The vessel is designed as per the Guidelines for ships operating in international waters. The economic analysis of the project was performed spanning over 20 years and the best freight was found out which would be most profitable for the company as well as be a good value for money for the customers.

  20. Using TRAILER tool for Managing Informal Learning in academic and professional contexts: the learners’ perspective

    NARCIS (Netherlands)

    Viegas, Maria C.; Marques, Maria A.; Alves, Gustavo R.; Zangrando, Valentina; Galanis, Nikolas; Brouns, Francis; Janssen, José; Waszkiewicz, Elwira; Mykowska, Alexandra; Conde, Miguel Á.; García-Holgado, Alicia; García-Peñalvo, Francisco J.

    2013-01-01

    Viegas, C., Marques, A., Alves, G., Zangrando, V., Galanis, N., Brouns, F., Janssen, J., Waszkiewicz, E., Mykowska, A., Gonzalez, M., Holgado, A., & García-Peñalvo, F. (2013). Using TRAILER tool for Managing Informal Learning in academic and professional contexts: the learners’ perspective. In F.

  1. A small stem-loop structure of the Ebola virus trailer is essential for replication and interacts with heat-shock protein A8.

    Science.gov (United States)

    Sztuba-Solinska, Joanna; Diaz, Larissa; Kumar, Mia R; Kolb, Gaëlle; Wiley, Michael R; Jozwick, Lucas; Kuhn, Jens H; Palacios, Gustavo; Radoshitzky, Sheli R; J Le Grice, Stuart F; Johnson, Reed F

    2016-11-16

    Ebola virus (EBOV) is a single-stranded negative-sense RNA virus belonging to the Filoviridae family. The leader and trailer non-coding regions of the EBOV genome likely regulate its transcription, replication, and progeny genome packaging. We investigated the cis-acting RNA signals involved in RNA-RNA and RNA-protein interactions that regulate replication of eGFP-encoding EBOV minigenomic RNA and identified heat shock cognate protein family A (HSC70) member 8 (HSPA8) as an EBOV trailer-interacting host protein. Mutational analysis of the trailer HSPA8 binding motif revealed that this interaction is essential for EBOV minigenome replication. Selective 2'-hydroxyl acylation analyzed by primer extension analysis of the secondary structure of the EBOV minigenomic RNA indicates formation of a small stem-loop composed of the HSPA8 motif, a 3' stem-loop (nucleotides 1868-1890) that is similar to a previously identified structure in the replicative intermediate (RI) RNA and a panhandle domain involving a trailer-to-leader interaction. Results of minigenome assays and an EBOV reverse genetic system rescue support a role for both the panhandle domain and HSPA8 motif 1 in virus replication. Published by Oxford University Press on behalf of Nucleic Acids Research 2016. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  2. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  3. Implementation of Virtual Reality in the Conceptual Design of a Tractor Trailer

    OpenAIRE

    Arunesh Chandra; Pankaj Chandna

    2014-01-01

    Virtual reality (VR) is a rapidly emerging computer interface that attempts to immerse the user completely within an experimental recreation; thereby, greatly enhancing the overall impact and providing a much more intuitive link between the computer and the human participants. The main objective of this study is to design tractor trailer capable of meeting the customers’ requirements and suitable for rough conditions to be used in combination with a farm tractor in India....

  4. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  5. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  6. 49 CFR 579.24 - Reporting requirements for manufacturers of 5,000 or more trailers annually.

    Science.gov (United States)

    2010-10-01

    ... incident, and whether the incident involved a fire, coded as follows: 02 suspension, 03 service brake..., 16 structure, 17 latch, 19 tires, 20 wheels, 21 trailer hitch, 23 fire, 98 where a system or... with more than one type of service brake system (i.e., hydraulic and air), the information required by...

  7. Potential of the tractor-trailer and container segments as entry markets for a proposed refrigeration technology

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.A.; Davis, L.J.; Garrett, B.A.

    1987-05-01

    The refrigerated trailer and container segments of the transportation industry are evaluated as potential entry markets for a proposed absorption refrigeration technology. To perform this analysis the existing transportation refrigeration industry is characterized; this includes a description of the current refrigeration technology, rating systems, equipment manufacturers, maintenance requirements, and sales trends. This information indicates that the current transportation refrigeration industry is composed of two major competitors, Thermo King and Carrier. In addition, it has low profit potential, some barriers to entry and low growth potential. Data are also presented that characterize the transportation refrigeration consumers, specifically, major groups, market segmentation, consumer decision process, and buying criteria. This consumer information indicates that the majority of refrigerated trailer consumers are private carriers, and that the majority of refrigerated container consumers are shipping companies. Also, these consumers are primarily interested in buying reliable equipment at a low price, and are quite satisfied with existing refrigeration equipment.

  8. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  9. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  10. Evolution of tyre/road noise research in India: Investigations using statistical pass-by method and noise trailer

    Directory of Open Access Journals (Sweden)

    Vivek Khan

    2018-05-01

    Full Text Available The objective of this research study was to investigate and analyze the acoustical characteristics of asphalt concrete and cement concrete surface types by two noise measurement techniques: statistical pass-by (SPB and Close Proximity (CPX methods. A noise trailer was devised and manufactured as part of the CPX methodology to evaluate tyre/pavement noise interaction at source. Two national highway test sections covering over 11 km of asphalt and cement concrete surfaces were selected to carry out the noise measurements, and the effects of vehicle speeds and/or sizes on the overall noise profiles were investigated. The major contribution of this first of its kind study in India was the utilization of sophisticated tools and techniques to measure the tyre/pavement interaction noise at source through CPX, which helped correlate the influence of road surfaces on the generation of overall road traffic noise using SPB technique. The SPB method noise profiles revealed that the noise pressure levels increased with increasing vehicle speeds and weights. The noise trailer CPX findings corroborated the results obtained from the SPB method in that cement concrete surface produced a higher noise at source than that of the asphalt concrete surface by about 5 dBA. Further, there was about 5 dBA differential in noise between SPB and CPX methods for cement concrete pavement sections; also, there was about 10 dBA differential in noise between the two methods for asphalt concrete pavement stretches. Keywords: Tyre/road noise, Statistical pass-by, Close proximity, Noise trailer, Asphalt concrete, Cement concrete

  11. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  12. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  13. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  14. Enhanced fuel efficiency on tractor-trailers using synthetic jet-based active flow control

    Science.gov (United States)

    Amitay, Michael; Menicovich, David; Gallardo, Daniele

    2016-04-01

    The application of piezo-electrically-driven synthetic-jet-based active flow control to reduce drag on tractor-trailers was explored experimentally in wind tunnel testing as well as full-scale road tests. Aerodynamic drag accounts for more than 50% of the usable energy at highway speeds, a problem that applies primarily to trailer trucks. Therefore, a reduction in aerodynamic drag results in large saving of fuel and reduction in CO2 emissions. The active flow control technique that is being used relies on a modular system comprised of distributed, small, highly efficient actuators. These actuators, called synthetic jets, are jets that are synthesized at the edge of an orifice by a periodic motion of a piezoelectric diaphragm(s) mounted on one (or more) walls of a sealed cavity. The synthetic jet is zero net mass flux (ZNMF), but it allows momentum transfer to flow. It is typically driven near diaphragm and/or cavity resonance, and therefore, small electric input [O(10W)] is required. Another advantage of this actuator is that no plumbing is required. The system doesn't require changes to the body of the truck, can be easily reconfigured to various types of vehicles, and consumes small amounts of electrical power from the existing electrical system of the truck. Preliminary wind tunnel results showed up to 18% reduction in fuel consumption, whereas road tests also showed very promising results.

  15. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  16. Auxiliary brakes for trucks : research into the behaviour of a tractor-semi-trailer combination during emergency breaking.

    NARCIS (Netherlands)

    Dijks, A. Blijswijk, W.A.M. van Genugten, J. van Meeke, G.J.M. & Schlösser, L.H.M.

    1976-01-01

    The purpose of the research was to obtain an insight into various secondary braking systems for goods vehicles. Practical tests were carried out with a tractor- semi-trailer combination. The performance of various split braking systems as well as spring brake actuators are shown. With nearly all of

  17. REDUCTION OF FUEL CONSUMPTION BY USINGAERODYNAMIC DOOR TOP PROFILE ON TRAILERAND SEMI-TRAILER

    OpenAIRE

    Topçu, İlhan; Çolakoğlu, Gülsüm Yeşim; Keleş, Uğur

    2016-01-01

    Fuel efficiency in vehicles is the important issue that dwells on for recent years not only for consumed fuel cost but also for the reduction of pollution caused by emission. There are several factor which affect the fuel consumption. One of them is aerodynamic resistance. Any decrease in the aerodynamic resistance has a great importance at fuel consumption. Especially fuel consumption in tractor trailer combination is much more than other automobiles. The main purpose of this report is to ex...

  18. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  19. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  20. Trailer temperature and humidity during winter transport of cattle in Canada and evaluation of indicators used to assess the welfare of cull beef cows before and after transport.

    Science.gov (United States)

    Goldhawk, C; Janzen, E; González, L A; Crowe, T; Kastelic, J; Kehler, C; Siemens, M; Ominski, K; Pajor, E; Schwartzkopf-Genswein, K S

    2015-07-01

    The current study evaluated 17 loads of cull beef cows transported in Canadian winter conditions to assess in-transit temperature and humidity, evaluation of events during loading and unloading, and animal condition and bruising. Regardless of the use of boards to block ventilation holes in trailers, temperatures were higher within trailers than at ambient locations during both travel and stationary periods (P cow transport may be related to pretransport animal condition and management of unloading.

  1. Analysis of the 241SY101 pump removal trailer and the 241SY101 strongback

    International Nuclear Information System (INIS)

    Coverdell, B.L.

    1995-09-01

    The purpose of the calculations contained in the attached appendix is to determine the vibrational stability of the following combination (The Combination); shipping container, strongback and trailer. The vibrational stability of The Combination will be determined with the shipping container and strongback in the upright position. If the natural frequency of The Combination coincides with the input frequency and no damping is present, resonance will occur. The result of this is that the natural frequency of the Combination must be calculated as well as the input frequency. The input frequency in this case is caused by wind. Due to their geometrical complexity the upper and lower hydraulic clevises were analyzed for structural adequacy by using finite-element analysis (FEA). The FEA software COSMOS/M version 1.70 was used to model the upper and lower hydraulic clevis. All designs are in accordance with Standard Architectural-Civil Design Criteria, Design Loads for Facilities (DOE-RL 1989) and are safety class 3. The design and fabrication of each component is in accordance with American Institute of Steel Construction, Manual of Steel Construction, (AISC, 1989). The analyses contained in this document reflects the as-built condition of the 241SY101 hydraulic trailer

  2. Relationships between Safe Pesticide Practice and Perceived Benefits and Subjective Norm, and the Moderation Role of Information Acquisition: Evidence from 971 Farmers in China.

    Science.gov (United States)

    Wang, Jianhua; Deng, Yuanyuan; Ma, Yuting

    2017-08-25

    Improper use of pesticides among farmers has caused food safety issues which are serious threats to public health in China. A central question concerns how to motivate farmers to self-regulate their pesticide usage. The paper aims to identify the influence of an internal driving factor, i.e., perceived benefits, and an external driving factor, i.e., subjective norm, on farmers' safe pesticide behaviors, and whether the two factors are moderated by the exposure to information on government policies and the market, based on a sample of 971 farmers selected from 5 Chinese provinces. The results revealed that farmers' safe pesticide usage was predominately driven by perceived benefits whereas external pressure or subjective norm did not play much of a role. Interaction effects were found between the exposure to market information and perceived benefits, and also between subjective norm and exposure to government policy. Extensions agencies are recommended to effectively convey to farmers the benefits to follow safe pesticide practices. Meanwhile, surveillance and monitoring systems should be established so that the prices of their agricultural products are reflected by the quality of the products.

  3. Service task partition and distribution in star topology computer grid subject to data security constraints

    Energy Technology Data Exchange (ETDEWEB)

    Xiang Yanping [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Levitin, Gregory, E-mail: levitin@iec.co.il [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Israel electric corporation, P. O. Box 10, Haifa 31000 (Israel)

    2011-11-15

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: > Grid service with star topology is considered. > An algorithm for evaluating service reliability and data security is presented. > A tradeoff between the service reliability and data security is analyzed. > A procedure for optimal service task partition and distribution is suggested.

  4. Service task partition and distribution in star topology computer grid subject to data security constraints

    International Nuclear Information System (INIS)

    Xiang Yanping; Levitin, Gregory

    2011-01-01

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: → Grid service with star topology is considered. → An algorithm for evaluating service reliability and data security is presented. → A tradeoff between the service reliability and data security is analyzed. → A procedure for optimal service task partition and distribution is suggested.

  5. The struggle for safe nuclear expansion in China

    International Nuclear Information System (INIS)

    Xu, Y.C.

    2014-01-01

    After a temporary halt following the Fukushima nuclear disaster in March 2011, China resumed its fast, yet cautious, expansion of nuclear energy programme. Nuclear energy is considered as part of the general strategy to deal with the challenges of energy security and climate change and to advance with ‘state of the art’ technology in its development. This article briefly discusses recent development in and driving forces behind nuclear industry in China, and several challenges it has been facing: how to adopt, adapt, standardise and indigenise whose technologies, and how to address the shortage of qualified nuclear engineers, scientists, skilled labour force and qualified regulators. More importantly, it argues that safe and secure nuclear development requires consistent policies and effective regulations. Therefore, it is crucial to build policy and regulatory capacities based on coordination, planning and management of government agencies and the industry. - Highlights: • Nuclear energy development in China. • Nuclear technology selection. • Human capital. • Regulatory regime. • Safe and secure development

  6. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  7. DESIGN MODELING OF A UNIVERSITY’S COMPREHENSIVE-INTEGRATED SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Marina V. Dulyasova

    2017-03-01

    Full Text Available Introduction: the safety of higher education institutions is considered to be of great importance nowadays. Security challenges need to be addressed through a comprehensive and integrative approach. This approach provides neutralisation of various threats systemically, risk prevention, minimisation of the tangible and moral harm. The project concept of “safe university” is proposed and substantiated for the above-mentioned purposes. Materials and Methods: the authors used a special literature survey on the issue, which is divided into three main groups of publications, where the complex security of educational institutions is considered in the context of the general theory of security, in the educational-methodical plan and within the framework of sociological, psychological and pedagogical approaches. The legislative and regulatory sources also indicated, legislative and regulatory legal acts reviews, “Safe City” concept, National standard “Information security technologies: complex and integrated ones. Standard requirements to architecture and technologies of intellectual systems of monitoring for safety of the companies and the territories” (State standard specification P 56875-2016, documents of higher education institutions, media reports. The analysis and generalisation of information was coupled with project modeling of the new comprehensive system of higher education institution security. Results: the authors introduce the concept, architecture and model of the comprehensive integrated higher education institution security, monitoring based on measures and indicators pertaining to implementation of standard requirements and level of satisfaction with safety, evaluation of the taken measures in terms of efficiency. Discussion and Conclusions: the main contours of the model for comprehensive integrated security system in a higher education institution and algorithm of interaction between the subjects are determined. These

  8. Branch-and-Price and Heuristic Column Generation for the Generalized Truck-and-Trailer Routing Problem || Branch-and-Price y generación heurística de columnas para el problema generalizado de rutas de trenes de carretera

    Directory of Open Access Journals (Sweden)

    Drexl, Michael

    2011-01-01

    Full Text Available The generalized truck-and-trailer routing problem (GTTRP constitutes a unified model for vehicle routing problems with trailers and a fixed lorry-trailer assignment. The GTTRP is a generalization of the truck-and-trailer routing problem (TTRP, which itself is an extension of the well-known vehicle routing problem (VRP. In the GTTRP, the vehicle fleet consists of single lorries and lorry-trailer combinations. Some customers may be visited only by a single lorry or by a lorry without its trailer, some may also be visited by a lorry-trailer combination. In addition to the customer locations, there is another relevant type of location, called transshipment location, where trailers can be parked and where a load transfer from a lorry to its trailer can be performed. In this paper, two mixed-integer programming (MIP formulations for the GTTRP are presented. Moreover, an exact solution procedure for the problem, a branch-and-price algorithm, and heuristic variants of this algorithm are described. Computational experiments with the algorithms are presented and discussed. The experiments are performed on randomly generated instances structured to resemble real-world situations and on TTRP benchmark instances from the literature. The results of the experiments show that instances of realistic structure and size can be solved in short time and with high solution quality by a heuristic algorithm based on column generation. || El problema generalizado de rutas de trenes de carretera (generalized truck-and-trailer routing problem, GTTRP constituye un modelo unificado para problemas de rutas de vehículos con remolques y asignación fija camión-remolque. El GTTRP es una generalización del truck-and-trailer routing problem (TTRP, que es una extensión del conocido problema de rutas de vehículos (vehicle routing problem, VRP. En el GTTRP, la flota de vehículos consiste en camiones sin remolque (camiones solos y trenes de carretera. Algunos clientes pueden

  9. MODELLING AND VALIDATION OF A TESTING TRAILER FOR ABS AND TYRE INTERACTION ON ROUGH TERRAIN

    OpenAIRE

    Žuraulis, Vidas; van der Merwe, Nico A.; Scholtz, Odette; Els, P. Schalk

    2017-01-01

    The main purpose of a vehicle anti-lock braking system (ABS) is to prevent the tyres from locking-up in order to brake efficiently whilst maintaining steering control and stability. Sport utility vehicles (SUV) are designed to drive on various roads under different driving conditions, making it challenging to identify optimal operating conditions for ABS algorithms to be implemented. This paper describes the development and modelling of a testing trailer that is designed to benefit the res...

  10. Android: Analysis of its architecture and security mechanism

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on? This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.

  11. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  12. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  13. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  14. The Replacement of Safe Assets: Evidence from the U.S. Bond Portfolio

    OpenAIRE

    Bertaut, Carol C.; Tabova, Alexandra M.; Wong, Vivian

    2014-01-01

    The expansion in financial sector "safe" assets, largely in the form of structured products from the U.S. and the Caribbean, in the lead-up to the global financial crisis has by now been fairly well documented. Using a unique dataset derived from security-level data on U.S. portfolio holdings of foreign securities, we show that since the crisis, it is mostly the foreign financial sector that appears to have met U.S. demand for safe and liquid investment assets by expanding its supply of debt ...

  15. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  16. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  17. Sacroiliac secure corridor: analysis for safe insertion of iliosacral screws

    Directory of Open Access Journals (Sweden)

    Henrique Alves Cruz

    2013-08-01

    Full Text Available OBJECTIVE: Posterior pelvic lesions, especially of the sacral-iliac joint, have high mortality and morbidity risks. Definitive fixation is necessary for the joint stabilization, and one option is the sacral percutaneous pinning with screws. Proximity to important structures to this region brings risks to the fixation procedure; therefore, it is important to know the tridimensional anatomy of the pelvis posterior region. Deviations of the surgeon's hand of four degrees may target the screws to those structures; dimorphisms of the upper sacrum and a poor lesion reduction may redound in a screw malpositioning. This study is aimed to evaluate the dimensions of a safe surgical corridor for safe sacroiliac screw insertion and relations with age and sex of the patients. METHOD: One hundred randomly selected pelvis CTs of patients with no pelvic diseases, seen at a tertiary care teaching Hospital. Measurements were made by computer and the safest area for screw insertion was calculated by two methods. The results were expressed in mm (not in degrees, in order to be a further surgical reference. RESULTS: There was a significant size difference in the analyzed sacral vertebra, differing on a wider size in men than in women. There was no significant statistical difference between vertebral size and age. By both methods, a safe area for screw insertion could be defined. CONCLUSION: Age does not influence the width of the surgical corridor. The surgeon has a safe corridor considered narrower when inserting screws in a female pelvis than when in a male one. However, as the smallest vertebra found (feminine was considered for statics, it was concluded that this corridor is 20 mm wide in any direction, taking as a reference the centrum of the vertebra.

  18. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  19. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  20. Devaluation of Safe Sex by Delay or Uncertainty: A Within-Subjects Study of Mechanisms Underlying Sexual Risk Behavior.

    Science.gov (United States)

    Wongsomboon, Val; Robles, Elias

    2017-10-01

    The value of safe sex may be discounted based on contextual factors associated with an opportunity for sex. College students in a within-subjects study selected hypothetical sexual partners from a set of pictures and classified them based on attractiveness and estimated chance of having an sexually transmitted infection (STI). In the Sexual Delay Discounting (SDD) task, participants rated their likelihood (0-100 %) of waiting for some period of time (e.g., 3 h) to have protected sex with their selected partners, when they could have immediate sex without protection. In the Sexual Probability Discounting (SPD) task, participants rated their likelihood of having protected sex if the opportunity was uncertain (e.g., 50 %), when they could have unprotected sex for sure (100 %). All participants included in the final analyses were aware of and had a positive attitude towards protection against STIs as they were likely to have immediate (or certain) protected sex. Results from 432 delay data in the SDD task and 488 probability data in the SPD task showed that participants' preference for safe sex systematically decreased as the delay to and odds against having safe sex increased. However, this preference was altered by the participants' perception of their partner's attractiveness and STI risk.

  1. Surveillance and Maintenance Plan for the 105-C Reactor Safe Storage Enclosure

    International Nuclear Information System (INIS)

    Logan, T. E.

    1998-01-01

    This document provides a plan for implementing surveillance and maintenance activities to ensure that the 105-C Reactor Safe Storage Enclosure is maintained in a safe, environmentally secure, and cost-effective manner until subsequent closure during the final disposition phase of decommissioning

  2. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  3. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  4. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  5. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  6. 77 FR 17568 - Notice of Receipt of Petition for Decision That Nonconforming 2005 Ifor Williams LM85G Trailers...

    Science.gov (United States)

    2012-03-26

    ...-0030, Notice 1] Notice of Receipt of Petition for Decision That Nonconforming 2005 Ifor Williams LM85G... Safety Administration (NHTSA) of a petition for a decision that 2005 Ifor Williams LM85G trailers that... capable of being altered to comply with, all applicable FMVSS based on destructive test data or such other...

  7. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  8. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  9. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  10. Non-Model-Based Control of a Wheeled Vehicle Pulling Two Trailers to Provide Early Powered Mobility and Driving Experiences.

    Science.gov (United States)

    Sanders Td Vr, David A

    2018-01-01

    Non-model-based control of a wheeled vehicle pulling two trailers is proposed. It is a fun train for disabled children consisting of a locomotive and two carriages. The fun train has afforded opportunities for both disabled and able bodied young people to share an activity and has provided early driving experiences for disabled children; it has introduced them to assistive and powered mobility. The train is a nonlinear system and subject to nonholonomic kinematic constraints, so that position and state depend on the path taken to get there. The train is described, and then, a robust control algorithm using proportional-derivative filtered errors is proposed to control the locomotive. The controller was not dependent on an accurate model of the train, because the mass of the vehicle and two carriages changed depending on the number, size, and shape of children and wheelchair seats on the train. The controller was robust and stable in uncertainty. Results are presented to show the effectiveness of the approach, and the suggested control algorithm is shown to be acceptable without knowing the exact plant dynamics.

  11. EUROSAFE forum 2013. Safe disposal of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The proceedings of the EUROSAFE forum 2013 - safe disposal of nuclear waste include contributions to the following topics: Nuclear installation safety - assessment; nuclear installation safety - research; waste and decommissioning - dismantling; radiation protection, 3nvironment and emergency preparedness; security of nuclear installations and materials.

  12. Truck Rollover Characterization for Class-8 Tractor-Trailers Utilizing Standard Dual Tires and New-Generation Single Tires

    Energy Technology Data Exchange (ETDEWEB)

    Capps, Gary [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). National Transportation Research Center; Knee, Bill [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). National Transportation Research Center; Franzese, Oscar [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). National Transportation Research Center; Pollock, Paul [Dana Corporation, Kalamazoo, MI (United States). Commercial Vehicle Systems Division; Coleman, Daniel [Dana Corporation, Kalamazoo, MI (United States). Commercial Vehicle Systems Division; Janajreh, Ibrahim [Michelin Americas Research and Development Corporation, Greenville, SC (United States); Haas, Steven [Michelin Americas Research and Development Corporation, Greenville, SC (United States); Frey, Norm [Michelin Americas Research and Development Corporation, Greenville, SC (United States); Law, Harry [Clemson Univ., SC (United States). Fluor Daniel Engineering Innovation Building; Johnson, Eric [Clemson Univ., SC (United States). Fluor Daniel Engineering Innovation Building; Lawson, Robert [Clemson Univ., SC (United States). Fluor Daniel Engineering Innovation Building; Petrolino, Joe [National Transportation Research Center, Inc., Knoxville, TN (United States); Rice, Dave [National Transportation Research Center, Inc., Knoxville, TN (United States)

    2005-07-30

    The Heavy Truck Rollover Characterization Project is a major research effort conducted by the National Transportation Research Center, Inc. (NTRCI) in partnership with Oak Ridge National Laboratory (ORNL), Dana Corporation (Dana), Michelin Americas Research and Development Corporation (Michelin) and Clemson University (Clemson), under the NTRCIs Heavy Vehicle Safety Research Center (HVSRC) for the Federal Highway Administration (FHWA). ORNL provided the day-to-day management of the project. The expertise mix of this team coupled with complementary research needs and interests, and a positive can-do attitude provided an extremely positive experimental research opportunity for all involved. Furthermore, this team supplied significant and valuable resources that provided a strong positive benchmark regarding the ability to conduct research within a public-private partnership. The work conducted by this team focused on initial efforts to generate data and information on heavy truck rollover not currently available in the industry. It reflects efforts within Phases 1 and 2 of a longer-term four-phase research program. A 1999 Peterbilt 379 class-8 tractor and 2004 Wabash dry freight van trailer were the test vehicles utilized in this effort. Both were instrumented with a number of sensors to capture the dynamics of the tractor and trailer as it engaged in various testing maneuvers that included: an evasive maneuver, swept sine, constant radius, and a run-off-the-road maneuver. The run-off-the-road maneuver was discontinued because the test track could not safety accommodate such a maneuver. These maneuvers were carried out utilizing both standard dual tires and new-generation dual tires in six test series. Two test series also included the use of a wider-slider suspension. Outriggers were placed on the test vehicle to assure that an actual rollover would not occur, however, the tests were designed to generate lift-off of tires during the tests. One of the main objectives

  13. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  14. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  15. Ecosecent:: Essence, Subject and Structure

    Directory of Open Access Journals (Sweden)

    Kozachenko Hanna V.

    2014-02-01

    Full Text Available The article shows that due to multi-laterality the knowledge about security is distributed by various branches, one of which is ecosestate, within which conditions of secure functioning of socio-economic systems and methods of their provision are studied. It shows the essence of ecosecent as a component of the “state – region (branch – subject of economic activity” ecosestate vertical – a set of knowledge about economic security of subjects of economic activity. It considers reasons that cause establishment of ecosecent: practical needs and a necessity to reconsider basic concepts of the essence, limits and factors of economy. It formulates the subject of ecosecent. It considers the status of the “economic security of the subject of economic activity” notion as its state, described with a set of parameters or characteristic features as characteristics of the subject of economic activity as a condition of its activity and as a set of actions that allow ensuring or preservation of the state of security, in other words, protection of the subject of economic activity. It presents general approaches to structuring of ecosecent by activity, functional and branch features.

  16. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  17. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  18. TRAILER project (Tagging, recognition, acknowledgment of informal learning experiences). A Methodology to make learners’ informal learning activities visible to the institutions

    NARCIS (Netherlands)

    García-Peñalvo, Francisco J.; Conde, Miguel Á.; Zangrando, Valentina; García-Holgado, Alicia; Seoane, Antón M.; Alier, Marc; Galanis, Nikolas; Brouns, Francis; Vogten, Hubert; Griffiths, Dai; Mykowska, Aleksandra; Alves, Gustavo R.; Minović, Miroslav

    2013-01-01

    García-Peñalvo, F. J., Conde, M. Á, Zangrando, V., García-Holgado, A., Seoane, A. M., Alier, M., Galanis, N., Brouns, F., Vogten, H., Griffiths, D., Mykowska, A., Ribeiro-Alves, G., & Minović, M. (2013). TRAILER project (Tagging, recognition, acknowledgment of informal learning experiences). A

  19. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  20. Welfare of Pigs Being Transported over Long Distances Using a Pot-Belly Trailer during Winter and Summer

    Directory of Open Access Journals (Sweden)

    Jorge A. Correa

    2014-04-01

    Full Text Available A total of 2,145 pigs were transported for 8 h in summer (six trips and winter (five trips using a pot-belly trailer accommodating pigs in four locations (upper deck or UD, bottom-nose or BN, middle deck or MD and bottom deck or BD. Heart rate of pigs during loading and transportation and lactate and creatine kinase (CK concentrations in exsanguination blood were measured. Meat quality was evaluated in the Longissimus thoracis (LT, Semimembranosus (SM and Adductor (AD muscles. During summer, pigs loaded in the UD and MD had higher (P < 0.05 heart rate at loading compared to those located in the BD and BN. Blood lactate and CK concentrations were higher (P < 0.001 in winter than in summer. Lactate concentration was higher (P = 0.01 in the blood of pigs transported in the BN. Pigs transported in the BN had higher pHu values in the LT, SM and AD muscles (P = 0.02, P < 0.001 and P = 0.002, respectively and lower (P = 0.002 drip loss values in the SM muscle. This study confirms that some locations within the PB trailer have a negative impact on the welfare of pigs at loading and during transport with more pronounced effects in the winter due to the additive effect of cold stress.

  1. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  2. Mothers' electrophysiological, subjective, and observed emotional responding to infant crying: The role of secure base script knowledge.

    Science.gov (United States)

    Groh, Ashley M; Roisman, Glenn I; Haydon, Katherine C; Bost, Kelly; McElwain, Nancy; Garcia, Leanna; Hester, Colleen

    2015-11-01

    This study examined the extent to which secure base script knowledge-reflected in the ability to generate narratives in which attachment-relevant events are encountered, a clear need for assistance is communicated, competent help is provided and accepted, and the problem is resolved-is associated with mothers' electrophysiological, subjective, and observed emotional responses to an infant distress vocalization. While listening to an infant crying, mothers (N = 108, M age = 34 years) lower on secure base script knowledge exhibited smaller shifts in relative left (vs. right) frontal EEG activation from rest, reported smaller reductions in feelings of positive emotion from rest, and expressed greater levels of tension. Findings indicate that lower levels of secure base script knowledge are associated with an organization of emotional responding indicative of a less flexible and more emotionally restricted response to infant distress. Discussion focuses on the contribution of mothers' attachment representations to their ability to effectively manage emotional responding to infant distress in a manner expected to support sensitive caregiving.

  3. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  4. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  5. Safe handling of radiation sources

    International Nuclear Information System (INIS)

    Abd Nasir Ibrahim; Azali Muhammad; Ab Razak Hamzah; Abd Aziz Mohamed; Mohammad Pauzi Ismail

    2004-01-01

    This chapter discussed the subjects related to the safe handling of radiation sources: type of radiation sources, method of use: transport within premises, transport outside premises; Disposal of Gamma Sources

  6. Psychological factors of the readiness of teachers to ensure social security in the educational environment.

    Directory of Open Access Journals (Sweden)

    Shmeleva E.A.

    2015-03-01

    Full Text Available The negative sociocultural transformations that are taking place in modern society and the resulting psychological transformation of personality and mode of life strongly require searching for ways of providing social safety to the next generation, with teachers being the implementers of this process. Teachers’ professionalism is determined by their willingness to solve personal and socially relevant problems, including the willingness to provide social security for other people, to thwart social risks, and to build constructive interpersonal relationships. The aim of our research was to reveal and to analyze the psychological factors affecting the readiness of teachers to ensure social security in educational environments. The environmental factors of social risk have been theoretically characterized. It has been shown that the essential factor in ensuring students’ social security is providing a safe social environment in educational institutions; such an environment provides the learners and the teachers with sociopsychological security and psychosocial well-being. The empirical part of our study was devoted to identifying negative social phenomena in the schools in the Ivanovo region (with the help of a questionnaire administered to 700 students and to identifying the personally and professionally important qualities of the teachers and the subjective psychological factors of their readiness to ensure social security in the educational environment (through interviewing 300 teachers; the administration of the questionnaires and the interviewing were followed by an assessment of their significance (with the help of a questionnaire administered to 140 teachers. Using factor analysis we identified the relevant indicators and grouped them into six factors of the readiness of teachers to ensure a safe educational environment. Relevant personal and professional qualities of teachers were revealed; these are the subjective factors of the

  7. The Concepts of Risk, Safety, and Security: Applications in Everyday Language.

    Science.gov (United States)

    Boholm, Max; Möller, Niklas; Hansson, Sven Ove

    2016-02-01

    The concepts of risk, safety, and security have received substantial academic interest. Several assumptions exist about their nature and relation. Besides academic use, the words risk, safety, and security are frequent in ordinary language, for example, in media reporting. In this article, we analyze the concepts of risk, safety, and security, and their relation, based on empirical observation of their actual everyday use. The "behavioral profiles" of the nouns risk, safety, and security and the adjectives risky, safe, and secure are coded and compared regarding lexical and grammatical contexts. The main findings are: (1) the three nouns risk, safety, and security, and the two adjectives safe and secure, have widespread use in different senses, which will make any attempt to define them in a single unified manner extremely difficult; (2) the relationship between the central risk terms is complex and only partially confirms the distinctions commonly made between the terms in specialized terminology; (3) whereas most attempts to define risk in specialized terminology have taken the term to have a quantitative meaning, nonquantitative meanings dominate in everyday language, and numerical meanings are rare; and (4) the three adjectives safe, secure, and risky are frequently used in comparative form. This speaks against interpretations that would take them as absolute, all-or-nothing concepts. © 2015 Society for Risk Analysis.

  8. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  9. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  10. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  11. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  12. Framework of the NPP I and C Security for Regulatory Guidance

    International Nuclear Information System (INIS)

    Kim, Young Mi; Jeong, Choong Heui

    2013-01-01

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems

  13. Framework of the NPP I and C Security for Regulatory Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Mi; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-10-15

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems.

  14. A statistical description of the types and severities of accidents involving tractor semi-trailers

    International Nuclear Information System (INIS)

    Clauss, D.B.; Wilson, R.K.; Blower, D.F.; Campbell, K.L.

    1994-06-01

    This report provides a statistical description of the types and severities of tractor semi-trailer accidents involving at least one fatality. The data were developed for use in risk assessments of hazardous materials transportation. Several accident databases were reviewed to determine their suitability to the task. The TIFA (Trucks Involved in Fatal Accidents) database created at the University of Michigan Transportation Research Institute was extensively utilized. Supplementary data on collision and fire severity, which was not available in the TIFA database, were obtained by reviewing police reports for selected TIFA accidents. The results are described in terms of frequencies of different accident types and cumulative distribution functions for the peak contact velocity, rollover skid distance, fire temperature, fire size, fire separation, and fire duration

  15. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  16. Are EU Banks Safe?

    NARCIS (Netherlands)

    R.J. Theissen (Roel)

    2013-01-01

    markdownabstract__Abstract__ What exactly are the rules banks are subject to, and are they fit for purpose? These are the two questions addressed in this book ‘Are EU banks safe?’ and its descriptive companion book ‘EU banking supervision’. The full rulebook on banks is difficult to find

  17. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  18. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  19. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  20. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  1. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    Science.gov (United States)

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  2. Learning with Security

    Science.gov (United States)

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  3. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  4. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  5. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  6. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  7. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  8. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  9. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  10. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  11. Safe delivery, Service utilization, Metekel Zone

    African Journals Online (AJOL)

    decision making power of subjects were found to have a statistically significant association with preference of safe delivery ... Studies that focused on maternal mortality and proportion of ...... Anna M, Hannekee M, Frank Odhiambo et.al. Use.

  12. Operation and maintenance of the T-3 cask system

    International Nuclear Information System (INIS)

    Hussey, M.W.; Berger, J.D.; Peterson, J.M.

    1983-01-01

    The T-3 cask system consists of three lead-shielded casks and the associated payload containers, internal fixturing, tiedowns, transportation trailers and handling devices. The three casks were designed to meet the requirements of Title 10 of the Code of Federal Regulations, Part 71. The Nuclear Regulatory Commission cask licensing activities for original design and for licensing revisions have required significant analytical support. Commercial transportation contractors can provide needed services including provisions of suitable equipment, compliances with security requirements, and safe movement of the shipment at a potential savings over DOE-owned transportation systems. Proper periodic inspection/maintenance activities supported by adequate decontamination facilities are a must in keeping the T-3 casks available for service

  13. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  14. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  15. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  16. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  17. Implementing AORN recommended practices for a safe environment of care, part II.

    Science.gov (United States)

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  18. A Framework for Evidence-Based Licensure of Adaptive Autonomous Systems: Technical Areas

    Science.gov (United States)

    2016-03-01

    autonomous tractor-trailer, the natural next evolution of the self - driving cars under development today. The tractor-trailer must be able to drive safely...letting other teens drive the vehicle , etc.) In this example, gradual permission for additional licensure and extended autonomous driving privileges under...to achieve a quasi-structured goal such as landing an airplane or driving a vehicle . This kind of autonomous system begins with core

  19. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  20. Analysis of application of different approaches to secure safe drinking water

    Directory of Open Access Journals (Sweden)

    Pendić Zoran

    2017-01-01

    Full Text Available In this analysis, the risk systems include the systems within which services sensitive to risk are executed. The complex service of population supply with safe drinking water is considered to be risky. Guidelines for drinking water quality of the World Health Organization (WHO recommends the use of effective preventive approaches to risk-based management of the safety and quality of drinking water. For example, Food Safety Law of the Republic of Serbia stipulates mandatory application of HACCP system in order to obtain safe drinking water. Different approaches to preventive risk-based management for the sake of the safety and quality of drinking water are applied nowadays. In this paper we consider the following approaches: Original Codex Alimentarius HACCP system and some of its modified versions; International standard ISO 22000: 2005 Food safety management systems - Requirements for any organization in the food chain; Water Safety Plan (WSP of the World Health Organization (WHO; Generalized HACCP system. All of these approaches are based, to a greater or lesser extent, on the original Codex Alimentarius HACCP system. The paper gives a situation analysis (SWOT analysis of considered approaches.

  1. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  2. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    Member States “Food and nutrition security exists when all people at all times have physical, social and economic access to food, which is safe and consumed in sufficient quantity and quality to meet their dietary needs and food preferences, and is supported by an environment of adequate sanitation...... by increasing availability, affordability and consumption of biodiverse, safe, nutritious foods aligned with dietary recommendations and environmental sustainability.  Given that the number of chronically undernourished (stunted) could double over next 15 years, the Post-2015 Agenda and its Poverty Reduction......The term “food and nutrition security” reflects the multisector collaboration needed between those working with food security and nutrition security. The term expresses an integrated development goal to help guide implementation of policy and cost-effective programmatic action: As agreed by FAO...

  3. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  4. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  5. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  6. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  7. USA perspectives. Safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Dicus, G.J.

    1999-01-01

    In contrast to the 103 licensed nuclear power plants in the United States, there are about 157,000 licenses that authorize the use of radioactive materials subject to US Atomic Energy Act. as amended. Each year the NRC receives about 200 reports of lost, stolen or abandoned radioactive sources and devices. The NRC has established a programme to review and analyze reports and other information on losses, thefts, abandonments, and discoveries of radioactive sources that helped to identify and characterize the problem with safety and security of radioactive sources in devices used under the general license programme. In summary, a large number of radioactive sources in use in the USA have a very good safety record. When used properly by trained personnel with effective regulatory oversight, the many uses of radioactive sources are safe and provide a net benefit to society. If problems occur such as overexposures or contamination of property, it is essential that hey are promptly reported to the regulatory authority. If necessary appropriate emergency response measures can be taken, and the problems analysed. In that way, effective risk-informed regulatory measures can be activated to assure the continued safety and security of radioactive sources

  8. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-08-01

    An automated approach to facility safeguards effectiveness evaluation has been developed. This automated process, called Safeguards Automated Facility Evaluation (SAFE), consists of a collection of a continuous stream of operational modules for facility characterization, the selection of critical paths, and the evaluation of safeguards effectiveness along these paths. The technique has been implemented on an interactive computer time-sharing system and makes use of computer graphics for the processing and presentation of information. Using this technique, a comprehensive evaluation of a safeguards system can be provided by systematically varying the parameters that characterize the physical protection components of a facility to reflect the perceived adversary attributes and strategy, environmental conditions, and site operational conditions. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  9. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  10. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  11. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  12. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  13. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  14. Nordic Walking May Safely Increase the Intensity of Exercise Training in Healthy Subjects and in Patients with Chronic Heart Failure.

    Science.gov (United States)

    Lejczak, Andrzej; Josiak, Krystian; Węgrzynowska-Teodorczyk, Kinga; Rudzińska, Eliza; Jankowska, Ewa A; Banasiak, Waldemar; Piepoli, Massimo F; Woźniewski, Marek; Ponikowski, Piotr

    2016-01-01

    Physical activity in patients with chronic heart failure (HF) improves the exercise capacity and quality of life, and may also reduce mortality and hospitalizations. The greatest benefits are achieved through high-intensity aerobic exercises resulting in a stronger cardiorespiratory response. Nordic walking (NW), a walking technique using two poles and mimicking the movements performed while cross-country skiing, is associated with the involvement of more muscle groups than in the case of classic walking, and should therefore make it possible to increase exercise intensity, resulting in more effective training for patients with HF. The aim of the study was to assess the feasibility and safety of the NW technique, and to compare the effort intensity while walking with and without the NW technique in both healthy subjects and in patients with chronic HF. The study involved 12 healthy individuals (aged 30 ± 10 years, 5 men) and 12 men with stable chronic systolic HF (aged 63 ± 11 years, all categorized in New York Heart Association class II, median LVEF 30%, median peak VO(2) 18.25 mL/kg/min). All the participants completed two randomly assigned submaximal walking tests (one with NW poles and one without) conducted on a level treadmill for 6 min at a constant speed of 5 km/h. Walking with the NW technique was feasible, safe and well tolerated in all subjects. In both the control group and the chronic HF group, walking with the NW technique increased peak VO(2), RER, VE, PET CO(2), HR and SBP over walking without the poles; and the fatigue grade according to the abridged Borg scale was higher. Dyspnea did not increase significantly with the NW technique. The NW technique can increase the intensity of aerobic training in a safe and well-tolerated way in both healthy individuals and in patients with chronic HF.

  15. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  16. [Subjective Gait Stability in the Elderly].

    Science.gov (United States)

    Hirsch, Theresa; Lampe, Jasmin; Michalk, Katrin; Röder, Lotte; Munsch, Karoline; Marquardt, Jonas

    2017-07-10

    It can be assumed that the feeling of gait stability or gait instability in the elderly may be independent of a possible fear of falling or a history of falling when walking. Up to now, there has been a lack of spatiotemporal gait parameters for older people who subjectively feel secure when walking. The aim of the study is to analyse the distribution of various gait parameters for older people who subjectively feel secure when walking. In a cross-sectional study, the gait parameters stride time, step time, stride length, step length, double support, single support, and walking speed were measured using a Vicon three-dimensional motion capture system (Plug-In Gait Lower-Body Marker Set) in 31 healthy people aged 65 years and older (mean age 72 ± 3.54 years) who subjectively feel secure when walking. There was a homogeneous distribution in the gait parameters examined, with no abnormalities. The mean values have a low variance with narrow confidence intervals. This study provides evidence that people who subjectively feel secure when walking demonstrate similarly objective gait parameters..

  17. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  18. Is nuclear power safe enough

    Energy Technology Data Exchange (ETDEWEB)

    Andresen, A F [Institutt for Atomenergi, Kjeller (Norway)

    1979-01-01

    The lecture formed a commentary on the report of the Norwegian Government's Commission on Nuclear power Safety which was published in October 1978. It was introductorily pointed out that 'safe' and 'safety' are not in themselves meaningful terms and that the probability of an occurrence is the real measure. The main items in the Commission's report have been core meltdown, releases during reprocessing, waste disposal, plutonium diversion and environmental impacts. The 21 members of the Commission were unanimous in 7 of the 8 chapters. In chapter 2, 'Summary and Conclusions', 3 members dissented from the majority opinion, that, subject to certain conditions, nuclear power was a safe and acceptable source of energy.

  19. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  20. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  1. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  2. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  3. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  4. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  5. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  6. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  7. Peaceful nuclear development and the three 'S' ('Safety', 'Security' and 'Safeguards')

    International Nuclear Information System (INIS)

    Julio Gonzalez, Abel; Abel Gonzalez, Martin

    2010-01-01

    We should agree on a comprehensive solution for a commensurate international control of both nuclear and radioactive material designed to ensure that peaceful nuclear developments will not cause harm to humanity. The concept of an international security system is clouded by the confusing semantics of its parts: the English concepts 'safeguards', 'safety' and 'security', on one hand, and nuclear and radioactive materials on the other hand. The objectives should be: to ensure, through appropriate safeguards, that nuclear materials are not diverted to non-peaceful activities; to prevent, through appropriate security, the unauthorized possession or use, illegal or malicious, of nuclear and radioactive materials; and, to ensure, through appropriate safety, that the use of nuclear and radioactive material will not cause harm to people and the environment. Security must be understood as an integral part of safeguards and safety, because materials that are secure are not necessarily safeguarded or safe, and materials may not be safeguarded or safe unless they are secure. Security is a necessary but not sufficient condition for safeguards and safety; security is an important but subsidiary condition of safeguards and safety; security is necessary but not sufficient to ensure nuclear control via safeguards and safety. In conclusion an International Treaty for the Control ('safeguards', 'safety' and 'security') of the Peaceful Development of Nuclear Energy and its Byproducts is proposed. It should clearly regulate the obligations and (non-compliance) penalties of the Parties, and, based on existing agreements, should be clear, logical, rational, fundamental, methodical, systematic, universal, equitable, impartial, fair and non discriminatory. (author)

  8. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  9. Simulation of cloud data security processes and performance

    OpenAIRE

    Chand, K; Ramachandran, M; Kor, AL

    2015-01-01

    In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security ...

  10. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  11. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  12. Conceptual design for PSP mounting bracket

    Energy Technology Data Exchange (ETDEWEB)

    Ransom, G.; Stein, R. [Martin Marietta Energy Systems, Inc., Piketon, OH (United States)

    1991-12-31

    Protective structural packages (PSP`s or overpacks) used to ship 2 1/2-ton UF{sub 6} product cylinders are bolted to truck trailers. All bolts penetrate two longitudinal rows of wooden planks. Removal and replacement is required at various intervals for maintenance and routine testing. A conceptual design is presented for mounting brackets which would securely attach PSP`s to trailer frames, reduce removal and replacement time, and minimize risk of personnel injury.

  13. Security of radioactive sources in radiation facilities

    International Nuclear Information System (INIS)

    2011-03-01

    Safety codes and safety standards are formulated on the basis of internationally accepted safety criteria for design, construction and operation of specific equipment, systems, structures and components of nuclear and radiation facilities. Safety codes establish the objectives and set requirements that shall be fulfilled to provide adequate assurance for safety. Safety guides and guidelines elaborate various requirements and furnish approaches for their implementation. Safety manuals deal with specific topics and contain detailed scientific and technical information on the subject. These documents are prepared by experts in the relevant fields and are extensively reviewed by advisory committees of the Board before they are published. The documents are revised when necessary, in the light of experience and feedback from users as well as new developments in the field. In India, radiation sources are being widely used for societal benefits in industry, medical practices, research, training and agriculture. It has been reported from all over the world that unsecured radioactive sources caused serious radiological accidents involving radiation injuries and fatalities. Particular concern was expressed regarding radioactive sources that have become orphaned (not under regulatory control) or vulnerable (under weak regulatory control and about to be orphaned). There is a concern about safety and security of radioactive sources and hence the need of stringent regulatory control over the handling of the sources and their security. In view of this, this guide is prepared which gives provisions necessary to safeguard radiation installations against theft of radioactive sources and other malevolent acts that may result in radiological consequences. It is, therefore, required that the radiation sources are used safely and managed securely by only authorised personnel. This guide is intended to be used by users of radiation sources in developing the necessary security plan for

  14. A Small Stem Loop Structure Of The Ebola Virus Trailer Is Essential For Replication And Interacts With Heat Shock Protein A8

    Science.gov (United States)

    2016-12-02

    Nucleic Acids Research , 2016 1–15 doi: 10.1093/nar/gkw825 A small stem -loop structure of the Ebola virus trailer is essential for replication and...is a single- stranded RNA that is linked to a stem -loop, as found in the region of the replication promoter element of the EBOV genomic leader (18...Kuhn4, Gustavo Palacios3, Sheli R. Radoshitzky3, Stuart F. J. Le Grice1,* and Reed F. Johnson2,* 1RT Biochemistry Section, Basic Research Laboratory

  15. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions ...

  16. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  17. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Center. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour training aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  18. Radioisotope thermoelectric generator load and unload sequence from the licensed hardware package system and the trailer system

    International Nuclear Information System (INIS)

    Reilly, M.A.

    1995-01-01

    The Radioisotope Thermoelectric Generator Transportation System, designated as System 100, comprises four major systems. The four major systems are designated as the Packaging System (System 120), Trailer System (System 140), Operations and Ancillary Equipment System (System 160), including the Radioisotope Thermoelectric Generator Transportation System packaging is licensed (regularoty) hardware, certified by the U.S. Department of Energy to be in accordance with Title 10, Code of Federal Regulations, Part 71 (10 CFR 71). System 140, System 160, and System 180 are nonlicensed (nonregulatory) hardware. This paper focuses on the required interfaces and sequencing of events required by these systems and the shipping and receiving facilities in preparation of the Radioisotope Thermoelectric Generator for space flight. copyright 1995 American Institute of Physics

  19. Agricultural Production, Food and Nutrition Security in Rural Benin ...

    African Journals Online (AJOL)

    Agricultural Production, Food and Nutrition Security in Rural Benin, Nigeria. ... that rural-urban migration results in shortage of manpower for agricultural activities. ... to support education, health care, sanitation and safe drinking water supply.

  20. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  1. 33 CFR 106.140 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...

  2. Design of a safe cylindrical lithium/thionyl chloride cell

    Science.gov (United States)

    Johnson, D. H.; Ayers, A. D.; Zupancic, R. L.; Alberto, V. S.; Bailey, J. C.

    1984-05-01

    Cell design criteria have been established which can result in a safe lithium/thionyl chloride cell. A cell vent, a low area internal anode design, cell balance and composition of the cathode-electrolyte solution have been found to be important factors in the design of a safe cell. In addition to routine testing, both undischarged and discharged cells have been subjected to electrical abuse, environmental abuse and mechanical abuse without disassembly.

  3. No safe place: parental alcoholism and adolescent suicide.

    Science.gov (United States)

    Meyer, D C; Phillips, W M

    1990-10-01

    A child growing up in an alcoholic home develops either little self-consolidation (I-ness) and efficacy (I can) or a distorted self (I am insignificant). This results in a desperate search for a soothing-object (We-ness). The sadomasochistic behaviors, which a youth witnesses and is subjected to, become internalized as survival skills, but ultimately fail. These factors set the stage for a destructive modus operandi. When there is peer group attachment pressure, this teen does not find security when questioning, "Who am I?" because there is no "I" and no "We". Instead, this adolescent experiences fear, anxiety, and range, and wonders, "What's going to happen to me?" This propels the youth into frantic behaviors that are meant to confirm a sense of "We-ness" and competence. The result, however, is greater frustration and a mirroring of the opposite. Also, since there is a diminutive capacity for trust and an exiguous chance to reach out or respond to significant others, external soothingness becomes unobtainable. When the adolescent is confronted with aloneness, helplessness, and hopelessness, desperation results and a search for a safe place ensues. Suicide holds such an illusion. It is the embodiment of sadomasochism and permits the cognition "I am capable." A case study illustrates the problems.

  4. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  5. Ensuring the security and availability of a hospital wireless LAN system.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  6. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  7. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    Science.gov (United States)

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  8. Does Variation in the Extent of Generalized Trust, Individual Education and Extensiveness of Social Security Policies Matter for Maximization of Subjective Well-Being?

    Science.gov (United States)

    Valeeva, Rania F.

    2016-01-01

    In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…

  9. Managing the safe mobility of older road users: How to cope with their diversity?

    DEFF Research Database (Denmark)

    Haustein, Sonja; Marin-Lamellet, Claude

    2014-01-01

    Against the background of an ageing population, the management of older people's safe mobility is becoming an increasingly important issue. Mobility is vital for older people's quality of life and several examples of good practice that support older people's safe mobility already exist. However...... groups who are already users and improve their (safe) use of the preferred transport mode. However, they do not seem to succeed in increasing mobility options, e.g. by encouraging car-reliant users to cycle or use public transport or by helping older women to continue to drive. We advise that existing...... systems, a lack of programmes to increase perceived security, as well as a comprehensive scheme for older drivers who have to stop driving....

  10. 12 CFR 560.40 - Commercial paper and corporate debt securities.

    Science.gov (United States)

    2010-01-01

    ... may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions... categories as to the portion of the security in which the association is investing by a nationally recognized... part. (4) Investments in corporate debt securities convertible into stock are subject to the following...

  11. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  12. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  13. CSIR eNews: Defence peace safety and security

    CSIR Research Space (South Africa)

    CSIR

    2008-03-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  14. CSIR eNews: Defence, peace, safety and security

    CSIR Research Space (South Africa)

    CSIR

    2007-12-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  15. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  16. Re-designing the PhEDEx security model

    International Nuclear Information System (INIS)

    Huang C-H; Wildish, T; Zhang X

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  17. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  18. Efficacy and safety of TVT-O and TVT-Secur in the treatment of female stress urinary incontinence: 1-year follow-up.

    Science.gov (United States)

    Tommaselli, Giovanni A; Di Carlo, Costantino; Gargano, Virginia; Formisano, Carmen; Scala, Mariamaddalena; Nappi, Carmine

    2010-10-01

    To reduce complications of transobturator tension-free vaginal tape, single-incision devices were introduced in the last years. We here report a comparison between the tension-free vaginal tape-obturator (TVT-O) and the TVT-Secur techniques in terms of efficacy and safety. Eighty-four patients with stress urinary incontinence (SUI) were scheduled to undergo TVT-O or TVT-Secur. Duration of the procedure, subjective estimate of blood loss, intraoperative and postoperative complications, postoperative postvoidal residue (PVR), time to first voiding, and pain level were recorded. Urodynamic tests, PVR, Incontinence Questionnaire Short Form (ICIQ-SF), King's Health Questionnaire, and a urinary diary were performed before and 12 months after procedure. No differences in terms of cure rate were observed between the two groups (81.6% vs. 83.8%). Complication rate in the TVT-Secur group was lower (8.1%) than in the TVT-O group (15.8%), but not significant. Both techniques seem to be effective and safe, with a low incidence of complications in both groups.

  19. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  20. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    Science.gov (United States)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  1. Objectivity applied to embodied subjects in health care and social security medicine: definition of a comprehensive concept of cognitive objectivity and criteria for its application.

    Science.gov (United States)

    Solli, Hans Magnus; Barbosa da Silva, António

    2018-03-02

    The article defines a comprehensive concept of cognitive objectivity (CCCO) applied to embodied subjects in health care. The aims of this study were: (1) to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, (2) to formulate criteria for application of such a CCCO, and (3) to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. The study design was based on a philosophical conceptual analysis of objectivity and subjectivity, the phenomenological notions 'embodied subject', 'life-world', 'phenomenological object' and 'empathy', and an interpretation of certificates as texts. The study material consisted of 18 disability assessments from a total collection of 86 medical certificates provided for social security purposes, written in a Norwegian hospital-based mental health clinic. Four necessary conditions identified for defining a CCCO were: (A) acknowledging the patient's social context and life-world, (B) perceiving patients as cognitive objects providing a variety of meaningful data (clinical, psychometric, and behavioural data - i.e. activities and actions, meaningful expressions and self-reflection), (C) interpreting data in context, and (D) using general epistemological principles. The criteria corresponding to these conditions were: (a) describing the patient's social context and recognizing the patient's perspective, (b) taking into consideration a variety of quantitative and qualitative data drawn from the clinician's perceptions of the patient as embodied subject, (c) being aware of the need to interpret the data in context, and (d) applying epistemological principles (professional expertise, dialogical intersubjectivity, impartiality, accuracy and correctness). Genuine communication is presupposed. These criteria were tested in the work disability assessments of medical

  2. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  3. MINING SECURITY PIPE© (TSM© WITH UNDERGROUND GPS GLOBAL© (RSPG© ESCAPE SECURITY DEVICE IN UNDERGROUND MINING

    Directory of Open Access Journals (Sweden)

    Rafael Barrionuevo GIMÉNEZ

    2016-04-01

    Full Text Available TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly. TSM is light and hand able pipe made with aramid (Kevlar, carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.. The open hardware and software like Arduino will be the heart of control and automation system.

  4. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  5. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  6. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  7. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  8. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  9. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  10. 76 FR 7623 - Parts and Accessories Necessary for Safe Operation; Brakes; Application for Exemption From...

    Science.gov (United States)

    2011-02-10

    ... potential significant market penetration in commercial trailers equipped with electric brakes. Consequently... current definition of a surge brake. DATES: Comments must be received on or before March 14, 2011... originally submitted, and suggested that the definition of surge brakes may someday require modification. For...

  11. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  12. Development of Safe Food Handling Guidelines for Korean Consumers.

    Science.gov (United States)

    Kang, Hee-Jin; Lee, Min-Woo; Hwang, In-Kyeong; Kim, Jeong-Weon

    2015-08-01

    The purpose of this study was to develop guidelines for Korean consumers with regard to safe food handling practices at home by identifying current food handling issues. Korean consumers' behaviors regarding their safe food handling were identified via survey questionnaires that included items on individual hygiene practices, prepreparation steps when cooking, the cooking process, and the storage of leftover foods. The subjects were 417 Korean parents with elementary school children living in Seoul and Gyeonggi Province in the central area of Korea. The survey results revealed gaps between the knowledge or practices of Korean consumers and scientific evidence pertaining to safe food handling practices. Based on these findings, a leaflet on safe food handling guidelines was developed in accordance with Korean food culture. These guidelines suggest personal hygiene practices as well as fundamental principles and procedures for safe food handling from the stage of food purchase to that of keeping leftover dishes. A pilot application study with 50 consumers revealed that the guidelines effectively improved Korean consumers' safe food handling practices, suggesting that they can serve as practical educational material suitable for Korean consumers.

  13. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  14. Organising a safe space for navigating social-ecological transformations to sustainability

    OpenAIRE

    Pereira, L.; Karpouzoglou, T.D.; Doshi, S.; Frantzeskaki, N.

    2015-01-01

    textabstractThe need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. Howeve...

  15. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  16. Closure Report for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Burmeister and Patrick Matthews

    2012-11-01

    The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.

  17. A Hard Month's Work in Manila. Securing Radioactive Sources

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  18. The Effects of Prompting and Reinforcement on Safe Behavior of Bicycle and Motorcycle Riders

    Science.gov (United States)

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was…

  19. Can Type 1 Diabetes patients safely fast during Ramadan?

    Directory of Open Access Journals (Sweden)

    M. Hamed Farooqi

    2016-09-01

    Full Text Available The issue whether people with Type 1 Diabetes can safely fast during Ramadan has been the subject of quite a few debates over the years. Had it been a simple "yes" or "no" issue, there would have been no reason to debate. However, like a lot of other topics in medical management, this particular subject overlaps both the science and the art of medicine.

  20. Security and robustness for collaborative monitors

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2016-01-01

    Decentralized monitors can be subject to robustness and security risks. Robustness risks include attacks on the monitor’s infrastructure in order to disable parts of its functionality. Security risks include attacks that try to extract information from the monitor and thereby possibly leak sensitive

  1. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  2. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  3. Proceedings of the workshop on intrinsically safe and economical reactors

    International Nuclear Information System (INIS)

    Livingston, R.S.

    1985-12-01

    This report presents the proceedings of a workshop concerning the design of inherently safe reactors. This paper emphasizes Japanese contributions to this subject, especially small reactors. Nine analytics were prepared for this report

  4. Estimating survival rates of quagga mussel (Dreissena rostriformis bugensis veliger larvae under summer and autumn temperature regimes in residual water of trailered watercraft at Lake Mead, USA

    Directory of Open Access Journals (Sweden)

    Wook Jin Choi

    2013-01-01

    Full Text Available On 6 January 2007, invasive quagga mussels [Dreissena rostriformis bugensis (Andrusov, 1897] were discovered in the Boulder Basin ofLake Mead, Nevada, a popular site for recreational boating in the southwestern United States. Recreational watercraft are considered aprimary vector for overland dispersal of quagga mussel veliger larvae between water bodies. Thus, effective decontamination of veligers inresidual water carried by trailered recreation boats is critical to controlling this species’ spread. The survival rate of quagga mussel veligerswas measured during exposure to environmental temperature conditions mimicking those experienced in the residual water of traileredvessels during warm summer and cooler autumn months in the semi-arid southwestern United States. Under warm summer conditions,quagga mussel veligers survived approximately five days while under cooler autumn conditions they survived 27 days. When tested underautumn temperature conditions veliger survival times increased with increased level of larval development. The results suggested a greaterlikelihood of veliger transport in the residual water of trailered watercraft during autumn months. The results indicated that presentlyrecommended vessel quarantine times to kill all externally attached juvenile and adult dreissenid mussels prior to launching in an uninfested water body should be increased to generate 100% veliger mortality in residual water unable to be fully drained from the internal areas of watercraft.

  5. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  6. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  7. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  8. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  9. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  10. 76 FR 12719 - Safe Schools/Healthy Students Program; Office of Safe and Drug-Free Schools; Safe Schools/Healthy...

    Science.gov (United States)

    2011-03-08

    ... DEPARTMENT OF EDUCATION Safe Schools/Healthy Students Program; Office of Safe and Drug- Free Schools; Safe Schools/Healthy Students Program; Catalog of Federal Domestic Assistance (CFDA) Numbers: 84... priorities, requirements, and definitions under the Safe Schools/Healthy Students (SS/HS) program. Since...

  11. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  12. Security: a Killer App for SDN?

    Science.gov (United States)

    2014-10-01

    Software Defined Networking ( SDN ) has been developed...the possible opportunities that result. 15. SUBJECT TERMS Software Defined Network , SDN , Network Routing, Security 16. SECURITY CLASSIFICATION OF...highwayman.com Highwayman Associates Ltd. Ross Anderson Ross.Anderson@cl.cam.ac.uk University of Cambridge ABSTRACT Software Defined Networking ( SDN ) has

  13. 29 CFR 2550.404a-3 - Safe harbor for distributions from terminated individual account plans.

    Science.gov (United States)

    2010-07-01

    ... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-3 Safe... rate of return, whether or not such return is guaranteed, consistent with liquidity (except that... liquidity; (v) A statement explaining what fees, if any, will be paid from the participant or beneficiary's...

  14. Versatile Endpoint Storage Security with Trusted Integrity Modules

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    2014-01-01

    . To counter such threats, and to remain trustworthy, personal devices should enforce storage security. State-of-the-art storage security solutions rely on hardware protected encryption. They cannot be deployed, as such, on personal devices either because they require additional hardware (e.g., NetApp’s Safe...... system and applications, that guarantee the durability, confidentiality and integrity of a configurable subset of the filesystem data and meta-data. While, we detail our design with the Linux virtual file system, we expect that our results can be applied to a range of different file systems. As Trusted...

  15. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  16. Reducing Maternal Mortality in Papua New Guinea: Contextualizing Access to Safe Surgery and Anesthesia.

    Science.gov (United States)

    Dennis, Alicia T

    2018-01-01

    Papua New Guinea has one of the world's highest maternal mortality rates with approximately 215 women dying per 100,000 live births. The sustainable development goals outline key priority areas for achieving a reduction in maternal mortality including a focus on universal health coverage with safe surgery and anesthesia for all pregnant women. This narrative review addresses the issue of reducing maternal mortality in Papua New Guinea by contextualizing the need for safe obstetric surgery and anesthesia within a structure of enabling environments at key times in a woman's life. The 3 pillars of enabling environments are as follows: a stable humanitarian government; a safe, secure, and clean environment; and a strong health system. Key times, and their associated specific issues, in a woman's life include prepregnancy, antenatal, birth and the postpartum period, childhood, adolescence and young womanhood, and the postchildbearing years.

  17. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  18. THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION

    Directory of Open Access Journals (Sweden)

    O. A. Selivanov

    2013-01-01

    Full Text Available The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. The author regards actualization of teenagers’ life experience as a promising direction for exploring the opportunities for creating the safe social environment.The individual socio-psychological functioning is delineated as a multilevel correlation of internal and external human resources used for resolving difficult situations. According to the author, the prompt mobilization of internal resources of a teenager, training the ability to apply the external resources for solving the problem and developing the safe behavior can improve the quality of life in the modern society. Along with the risks of modern information society, the author emphasizes a number of dangerous social trends: disruption of social institutions, ifantilization of education, distortion of historical cultural channels, and devaluation of the collectivism idea.In author’s opinion, teenagers should get some special knowledge and individual training to develop the skills of safe behavior in actual situations; and the prospects of the modern society considerably depend on the above procedures. 

  19. 48 CFR 225.401-70 - End products subject to trade agreements.

    Science.gov (United States)

    2010-10-01

    ... Pub. L. 103-139. FSG Category/Description 22 Railway equipment 23 Motor vehicles, trailers, and cycles... Engine accessories 30 Mechanical power transmission equipment 32 Woodworking machinery and equipment 34... record equipment and ADP equipment 75 Office supplies and devices 76 Books, maps, and other publications...

  20. 29 CFR 2550.404a-2 - Safe harbor for automatic rollovers to individual retirement plans.

    Science.gov (United States)

    2010-07-01

    ... retirement plans. 2550.404a-2 Section 2550.404a-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-2 Safe..., whether or not such return is guaranteed, consistent with liquidity; (ii) For purposes of paragraph (c)(3...

  1. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  2. Safe Driving After Propofol Sedation.

    Science.gov (United States)

    Summerlin-Grady, Lee; Austin, Paul N; Gabaldon, Dion A

    2017-10-01

    Propofol is a short-acting medication with fast cognitive and psychomotor recovery. However, patients are usually instructed not to drive a motor vehicle for 24 hours after receiving propofol. The purpose of this article was to review the evidence examining when it is safe to drive after receiving propofol for sedation for diagnostic and surgical procedures. This is a systematic review of the literature. A search of the literature was conducted using Google Scholar, PubMed, and the Cochrane Library for the time period 1990 to 2015. Two randomized controlled trials and two observational studies met the inclusion criteria. Using a simulator, investigators examined driving ability of subjects who received modest doses (about 100 mg) of propofol for endoscopic procedures and surveyed subjects who drove immediately after discharge. There were methodological concerns with the studies such as small sample sizes, modest doses of propofol, and three of the four studies were done in Japan by the same group of investigators limiting generalizability. This limited research suggests that it may be safe for patients to drive sooner than 24 hours after receiving propofol. However, large multicenter trials using heterogenous samples using a range of propofol doses are needed to support an evidence-based revision to the current discharge guidelines for patients receiving propofol. Copyright © 2016 American Society of PeriAnesthesia Nurses. Published by Elsevier Inc. All rights reserved.

  3. Integrating Safety and Security in the EU: Past developments and suggested ways forward

    International Nuclear Information System (INIS)

    Rossi, Loris

    2016-01-01

    The Framework provided by the UN Model Regulation for the Transport of Dangerous Goods is the core of the legislation on transport of radioactive material (and all classes of dangerous goods) in the EU. This has resulted in European agreements ADR, RID and ADN for international transport as well as a single directive for land transport within the EU. In addition the EU has adopted a range of directives and regulations dealing specifically with several aspects of safety of nuclear and radioactive material. While the overall safety framework is now well developed and fairly stable, a security framework is evolving, based on the IAEA recommendations. In the EU, several initiatives such as the CBRN action plan and the review of the application of telematics for the transport of dangerous goods will most likely result in more developments coming on stream in the near future. This suggests that an integrated approach would be beneficial to avoid divergent developments and to keep track of new developments in an orderly fashion. An integrated approach for a safe and secure supply chain for radioactive material is proposed. The framework for a supply chain can be built around the extensive corpus of legislation/recommendations and concepts that are already existing (such as the “Known Consignor” in the framework of the EU aviation security or the “Authorised Economic Operator” in the EU Community Custom Code). This would allow for the need to maintain control of the numerous proposals that are taking place. Advantages and drawbacks are outlined. More generally, the development of an integrated safe and secure supply chain would bring clarity and transparency to the overall system of provisions for a safe and secure management of radioactive material. (author)

  4. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  5. Computer Security: “Heartbleed” - a disaster for privacy

    CERN Multimedia

    Computer Security Team

    2014-01-01

    "On a scale of 1 to 10, this is an 11,” claimed the famous security expert Bruce Schneier (see here). Indeed, the serious vulnerability dubbed “Heartbleed” affects everyone who relies on secure and private Internet communication. You cannot avoid it, so let’s see how it affects you.   “Heartbleed” is the name that's been given to a vulnerability for OpenSSL (CVE-2014-0160). This software implements “the Secure Socket Layer (SSL v2/v3) and Transport Layer Security (TLS) protocols as well as a full-strength general purpose cryptography library”. SSL and TLS protocols are used to encrypt any communication between a client and a server, and to ensure that your communication is safe from eavesdropping or spying - that is, until 2012, when this bug was introduced. It allows the extraction of the first 64 kB from the memory of a server or client using OpenSSL (not necessarily web servers), and can potent...

  6. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  7. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  8. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  9. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  10. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Safe pediatric surgery: development and validation of preoperative interventions checklist

    Directory of Open Access Journals (Sweden)

    Maria Paula de Oliveira Pires

    2013-09-01

    Full Text Available OBJECTIVES: this study was aimed at developing and validating a checklist of preoperative pediatric interventions related to the safety of surgical patients. METHOD: methodological study concerning the construction and validation of an instrument with safe preoperative care indicators. The checklist was subject to validation through the Delphi technique, establishing a consensus level of 80%. RESULTS: five professional specialists in the area conducted the validation and a consensus on the content and the construct was reached after two applications of the Delphi technique. CONCLUSION: the "Safe Pediatric Surgery Checklist", simulating the preoperative trajectory of children, is an instrument capable of contributing to the preparation and promotion of safe surgery, as it identifies the presence or absence of measures required to promote patient safety.

  12. Use of Liquefied Biomethane (LBM) as a Vehicle Fuel for Road Freight Transportation : A Case Study Evaluating Environmental Performance of Using LBM for Operation of Tractor Trailers

    OpenAIRE

    Shanmugam, Kavitha; Tysklind, Mats; Upadhyayula, Venkata K.K.

    2018-01-01

    The environmental performance of Liquefied Biomethane (LBM) and Diesel operated Tractor Trailer (TT) is compared using the Life Cycle Assessment (LCA) study. In this study we consider, raw biogas produced from an anaerobic digestion process of a Wastewater Treatment Plant (WWTP) in Umea, Sweden, which is then upgraded and liquefied to LBM and used as a fuel for TTs. Currently, the WWTP in Umea is utilizing biogas, produced onsite for cogeneration of heat and electricity, thereby meeting its e...

  13. Season, Transport Duration and Trailer Compartment Effects on Blood Stress Indicators in Pigs: Relationship to Environmental, Behavioral and Other Physiological Factors, and Pork Quality Traits

    Directory of Open Access Journals (Sweden)

    Roberta Sommavilla

    2017-02-01

    Full Text Available The objective of this study was to assess the effects of the season, travel duration and trailer compartment location on blood creatine-kinase (CK, lactate and cortisol concentrations in 384 pigs and assess their relationships with trailer temperature, heart rate and gastrointestinal tract temperature (GTT, behavior, carcass damage scores and meat quality. Blood CK was greater in pigs transported in summer (p = 0.02, after 18 h transportation (p < 0.001 and in pigs located in C4, C5 and C10 (p = 0.002. In winter, the concentration of blood lactate was higher (p = 0.04 in pigs transported for 6 h in C5. Pigs located in C10 showed higher (p = 0.01 concentration of cortisol than those transported for 18h in C4 in summer. The highest correlations were between blood cortisol and GTT (r = 0.53; p < 0.001, and between blood CK and GTT (r = 0.41; p < 0.001, truck temperature (r = 0.42; p < 0.001, and pHu in the longissimus muscle (r = 0.41; p < 0.001. In conclusion, although increased blood cortisol and CK levels appear to indicate a physical stress condition in transported pigs, the weak to moderate correlations with environmental and other animal welfare indicators suggest that blood stress parameters can only be used as a complementary measurement in the assessment of the pigs’ response to transport stress.

  14. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  15. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  16. The production of human security in premodern and contemporary history

    OpenAIRE

    Zwierlein, Cornel; Graf, Rüdiger

    2010-01-01

    "Since the end of the Cold War, Human Security has become an important approach in international politics, law, and political science. In contrast to the so-called 'Westphalian System' that knows only states as subjects and objects of security, human security aims at the security of individual human beings if failed or failing states do not protect them nor provide for their basic needs. Thereby, such heterogeneous forms of security as security from war, food security, energy security or secu...

  17. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    -driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...

  18. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  19. A Novel Cloud Computing Algorithm of Security and Privacy

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chen

    2013-01-01

    Full Text Available The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS, to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.

  20. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  1. Conceptualizing energy security

    International Nuclear Information System (INIS)

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  2. Current status of securing Category 1 and 2 radioactive sources in Taiwan

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Y-F.; Tsai, C-H. [Atomic Energy Council of Executive Yuan of Taiwan (China)

    2014-07-01

    For enhancing safe and secure management of Category 1 and 2 radioactive sources against theft or unauthorized removal, AEC (Atomic Energy Council) of Taiwan have been regulating the import/export of the sources ever since 2005, in compliance with the IAEA's (International Atomic Energy Agency) 'Guidance on the Import and Export of Radioactive Sources'. Furthermore in consulting the IAEA Nuclear Security Series No.11 report, administrative regulations on the program of securing the sources have been embodied into AECL's regulatory system since 2012, for the purpose of enforcing medical and non-medical licensees and industrial radiographers to establish their own radioactive source security programs. Regulations require that security functions such as access control, detection, delay, response and communication and security management measures are to be implemented within the programs. This paper is to introduce the current status in implementing the security control measures in Taiwan. (author)

  3. 12 CFR 615.5451 - Book-entry and definitive securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...

  4. Governing food security. Law, politics and the right to food

    NARCIS (Netherlands)

    Hospes, O.; Hadiprayitno, I.

    2010-01-01

    With only five years left until the 2015 deadline to achieve the Millennium Development Goals, food security still is a dream rather than reality: 'a situation that exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary

  5. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  6. Organising a safe space for navigating social-ecological transformations to sustainability.

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-05-28

    The need for developing socially just living conditions for the world's growing population whilst keeping human societies within a 'safe operating space' has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a 'safe space' to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  7. Reviews on Security Issues and Challenges in Cloud Computing

    Science.gov (United States)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  8. Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

    Directory of Open Access Journals (Sweden)

    Alexandre Bouard

    2013-12-01

    Full Text Available Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticated connected services. More than just ensuring the role of a safe transportation mean, they process private information, industrial secrets, communicate with our smartphones, Internet and will soon host thirdparty applications. Their pervasive computerization makes them vulnerable to common security attacks, against which automotive technologies cannot protect. The transition toward Ethernet/IP-based on-board communication could be a first step to respond to these security and privacy issues. In this paper, we present a security framework leveraging local and distributed information flow techniques in order to secure the on-board network against internal and external untrusted components. We describe the implementation and integration of such a framework within an IP-based automotive middleware and provide its evaluation.

  9. A Hard Month's Work in Manila. Securing Radioactive Sources (Arabic Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  10. A Hard Month's Work in Manila. Securing Radioactive Sources (Chinese Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  11. A Hard Month's Work in Manila. Securing Radioactive Sources (Spanish Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  12. A Hard Month's Work in Manila. Securing Radioactive Sources (Russian Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  13. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  14. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  15. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  16. Safety, security, hygiene and privacy in migrant farmworker housing.

    Science.gov (United States)

    Arcury, Thomas A; Weir, Maria M; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F; Bischoff, Werner E; Quandt, Sara A

    2012-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed.

  17. Cloud Computing Security in Openstack Architecture: General Overview

    Directory of Open Access Journals (Sweden)

    Gleb Igorevich Shakulo

    2015-10-01

    Full Text Available The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security concerns, thus making cloud computing more secure technology.

  18. Is safe surgery possible when resources are scarce?

    Science.gov (United States)

    O'Hara, Nathan N

    2015-07-01

    The greatest burden of surgical disease exists in low- and middle-income countries, where the quality and safety of surgical treatment cause major challenges. Securing necessary and appropriate medical supplies and infrastructure remains a significant and under-recognised limitation to providing safe and high-quality surgical care in these settings. The majority of surgical instruments are sold in high-income countries. Limited market pressures lead to superfluous designs and inflated costs for these devices. This context creates an opportunity for frugal innovation-the search for designs that will enable low-cost care without compromising quality. Although progressive examples of frugal surgical innovations exist, policy innovation is required to augment design pathways while fostering appropriate safety controls for prospective devices. Many low-cost, high-quality medical technologies will increase access to safe surgical care in low-income countries and have widespread applicability as all countries look to reduce the cost of providing care, without compromising quality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  20. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    Science.gov (United States)

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  1. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Reporting Postage Evidencing System security... security weaknesses. (a) For purposes of this section, provider refers to the Postage Evidencing System... Evidencing System model subject to each such method. Potential security weaknesses include but are not...

  2. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  3. AVIATION SECURITY AS AN OBJECT OF MATHEMATICAL MODELING

    Directory of Open Access Journals (Sweden)

    N. Elisov Lev

    2017-01-01

    Full Text Available The paper presents a mathematical formulation of the problem formalization of the subject area related to aviation security in civil aviation. The formalization task is determined by the modern issue of providing aviation security. Aviationsecurity in modern systems is based upon organizational standard of security control. This standard doesn’t require calcu- lating the security level. It allows solving the aviation security task without estimating the solution and evaluating the per- formance of security facilities. The issue of acceptable aviation security level stays unsolved, because its control lies in inspections that determine whether the object security facilities meet the requirements or not. The pending problem is also in whether the requirements are calculable and the evaluation is subjective.Lately, there has been determined quite a certain tendency to consider aviation security issues from the perspective of its level optimal control with the following identification, calculation and evaluation problems solving and decision mak- ing. The obtained results analysis in this direction shows that it’s strongly recommended to move to object formalization problem, which provides a mathematical modeling for aviation security control optimization.In this case, the authors assume to find the answer in the process of object formalization. Therefore aviation secu- rity is presented as some security environment condition, which defines the parameters associated with the object protec-tion system quality that depends on the use of protective equipment in conditions of counteraction to factors of external andinternal threats. It is shown that the proposed model belongs to a class of boundary value problems described by differential equations in partial derivatives. The classification of boundary value problems is presented.

  4. The Use of Vaporous Hydrogen Peroxide for Building Decontamination Final Report CRADA No. TC-2053-02

    Energy Technology Data Exchange (ETDEWEB)

    Verce, M. F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Schwartz, L. I. [Strategic Technology Enterprises, Inc., Mentor, OH (United States)

    2017-09-08

    This was a collaborative effort between LLNL and STE to investigate the use of vaporized hydrogen peroxide (VHP®) to decontaminate spore-contaminated heating, ventilation, and cooling (HV AC) systems in a trailer sized room. LLNL's effort under this CRADA was funded by DOE's Chemical and Biological National Security Program (CBNP), which later became part of Department of Homeland Security in 2004.

  5. METHODOLOGICAL APPROACHES TO ORGANIZATION OF SAFE INFORMATION AND EDUCATIONAL ENVIRONMENT OF THE UNIVERSITY

    Directory of Open Access Journals (Sweden)

    A. N. Privalov

    2017-01-01

    Full Text Available Introduction. One of the tendencies of modern higher education is the ubiquitous use of information and communication technologies. At the same time, the functioning of the electronic information and educational environment (IEE of the university should be based on the means of IEE and the condition of its information security.The aim of the research is conceptualization of a problem of the rational organization of the safe information and education environment of higher education institution wherein reliable protection of its infrastructure, the personal and unique information of a pupil and teacher and virtual space of their educational interaction is provided.Methodology and research methods. System-based approach is a key approach to organization of safe educational environment of the university. From the point of view of authors, personal-activity and functional approaches are expedient while designing and development of a safe IEE. Socio-historical and theoretical-methodological analysis, modeling, research and synthesis of experience of effective application of the systems approach in educational professional organizations are used.Results and scientific novelty. The concept «safe information educational environment of the university» is specified wherein the first word has to express a predominant quality of the system. Creating a safe information environment in educational professional organizations provides a convenient and safe educational environment in the process of professional training of university students. The components and directions for the organization of the safe IEE are highlighted. Practical recommendations for its design and successful functioning are given.Practical significance. The materials of the present research can be demanded by managers and administrative employees of educational organizations. 

  6. Safe Kids Worldwide

    Science.gov (United States)

    ... Blog Videos Newsletter facebook twitter instagram pinterest gplus youtube Search Menu Why It Matters Who We Are What We Do Find Your Safe Kids Safe Kids Day Main menu Keeping All Kids Safe Safety Tips Get Involved 4 Star Charity Donate Text Burns and Scalds 4 tips ...

  7. A human engineering and ergonomic evaluation of the security access panel interface

    International Nuclear Information System (INIS)

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard

  8. The right to adequate and safe working conditions in Ukraine

    Directory of Open Access Journals (Sweden)

    Едуард Валентинович Гаврилов

    2016-06-01

    Full Text Available The special attention is given to the rights of the citizens for independent and safe working conditions. The rights secured by law and guaranteed of each among workers and employers have been considered. The court case on infliction of harm to health in the performance of job duties has been analyzed. Taking this case as an example one can see different possible ways of its solution that cause controversy and contradictions. The Court of First Instance takes the side of the employer, Court of Appeal – on the side of the victim and consideration of the case on cassation appeal - shows only that the state taking the role of the judge is on the employer side not on the side of the worker as a victim. So, one can see that course of the state policy secured by legislators in the numerous normative acts and being reflection of the constitutional principle of the recognition by the state of  the human being, his or her life and health, honour and dignity, inviolability and security as the highest social value that is foreseen by Article 3 and by the provision of Part 4 Article 43 of the Basic Law does not correspond to the realities of life.

  9. FINANCIAL SECURITY OF FOOD INDUSTRY ENTERPRISES IN POLAND

    Directory of Open Access Journals (Sweden)

    Anna Bieniasz

    2016-06-01

    Full Text Available The aim of the study was to evaluate the fi nancial security of food industry enterprises in Poland in 2009–2013, with particular emphasis on the processing industry of milk and cheese production, including those operating in the form of dairy cooperatives. The analysis was conducted using unpublished data of GUS, as well as individual fi nancial data on dairy cooperatives. The study indicates that the manufacturing sector of food and beverage production, as well as milk processing and cheese making, according to the established measures of fi nancial security, can be considered safe. This assessment, however, is varied and results from the specifi c industries, especially in relation to capital management.

  10. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  11. Report of the investigation of the accident at the MIDAS MYTH/MILAGRO Trailer Park on Rainier Mesa at Nevada Test Site on February 15, 1984

    International Nuclear Information System (INIS)

    1984-01-01

    Fourteen persons were injured, one fatally, when the ground upon which they were working collapsed, forming a subsidence crater in the recording trailer park of the MIDAS MYTH/MILAGRO nuclear weapons effects test on Rainier Mesa at the US Department of Energy's Nevada Test Site on February 15, 1984. Those persons injured were contractor and laboratory employees from Reynolds Electrical and Engineering Co., Inc. (REECo), Pan American World Services, Inc. (PANAM), and the Los Alamos National Laboratory (LANL). This report presents the results of an investigation into the causes, effects, and response to the accident. 42 figures

  12. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  13. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  14. Farmland Tenure Security in China: Influencing Factors of Actual and Perceived Farmland Tenure Security

    Science.gov (United States)

    Ren, Guangcheng; Zhu, Xueqin; Heerink, Nico; van Ierland, Ekko; Feng, Shuyi

    2017-04-01

    Tenure security plays an important role in farm households' investment, land renting and other decisions. Recent literature distinguishes between actual farmland tenure security (i.e. farm households' actual control of farmland) and perceived farmland tenure security (i.e. farm households' subjective understanding of their farmland tenure situation and expectation regarding government enforcement and equality of the law). However little is known on what factors influence the actual and perceived farmland tenure security in rural China. Theoretically, actual farmland tenure security is related to village self-governance as a major informal governance rule in rural China. Both economic efficiency and equity considerations are likely to play a role in the distribution of land and its tenure security. Household perceptions of farmland tenure security depend not only on the actual farmland tenure security in a village, but may also be affected by households' investment in and ability of changing social rules. Our study examines what factors contribute to differences in actual and perceived farmland tenure security between different villages and farm households in different regions of China. Applying probit models to the data collected from 1,485 households in 124 villages in Jiangsu, Jiangxi, Liaoning and Chongqing, we find that development of farmland rental market and degree of self-governance of a village have positive impacts, and development of labour market has a negative effect on actual farmland tenure security. Household perceptions of tenure security depend not only on actual farmland tenure security and on households' investment in and ability of changing social rules, but also on risk preferences of households. This finding has interesting policy implications for future land reforms in rural China.

  15. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  16. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  17. ONTOLOGICAL MODEL OF STRATEGIC ECONOMIC SECURITY OF ENTERPRISE

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2014-01-01

    Full Text Available Article explains the necessity the application of the ontological approach to modeling the strategic economic security in the formalization of the basic categories of domain company recognized its benefits. Among the advantages of the model distinguishes its versatility and ability to describe various aspects of strategic security - the system strategies and goals of the organization and business processes; possibility of its use at different levels of detail - from the top-level description of the basic categories of management, to design-level analytic applications; as well as the adaptability of the model, with depth on particular aspects determined by practical necessity and not regulated methodology. The model integrates various aspects of the concept of enterprise architecture and organizes conceptual apparatus. Ontological model easy to understand and adjust as business architects and specialists in designing systems of economic security and offers many categories of verbal representation of the domain of the enterprise. Proved the feasibility of using process-functional approach in providing strategic economic security, according to which the components of such a security company proposed as business processes, finance, staff and contractors. The article presents the author's ontological model of strategic economic security, including endangered sites, the presence of factors that threaten the security of the object and the subject of providing security. Further, it is proved that in the subjects of security impact on the object using the tools, measures and activities within the strategy formed the mechanism is implemented managerial decisions to strengthen the strategic economic security. The process of diagnosis, detection, identification of threats of economic security, and the development of enterprise development strategies, taking into account its level of economic security must be under the constant supervision of the process of

  18. The Safe Area in the Parieto-Occipital Lobe in the Human Brain: Diffusion Tensor Tractography.

    Science.gov (United States)

    Jang, Sung Ho; Kim, Seong Ho; Kwon, Hyeok Gyu

    2015-06-01

    A recent study reported on the relatively safe area in the frontal lobe for performance of neurological interventions; however, no study on the posterior safe area has been reported. In this study, using diffusion tensor tractography, we attempted to identify the safe area in the parieto-occipital lobe in healthy subjects. A total of 47 healthy subjects were recruited for this study. Eleven neural tracts were reconstructed in and around the parieto-occipital area of the brain using diffusion tensor tractography. The safe area, which is free from any trajectory of 10 neural tracts, was measured anteriorly and medially from the line of the most posterior and lateral margin of the brain at 5 axial levels (from the cerebral cortex to the corona radiata). The anterior boundaries of the safe area in the upper cerebral cortex, lower cerebral cortex, centrum semiovale, upper corona radiata, and lower corona radiata levels were located at 31.0, 32.6, 32.7, 35.1, and 35.2 mm anteriorly from the line of the most posterior margin of the brain, respectively, and the medial boundaries were located at an average of 34.7, 38.1, 39.2, 36.1, and 33.6 mm medially from the line of the most lateral margin of the brain, respectively. According to our findings, the safe area was located in the posterolateral portion of the parieto-occipital lobe in the shape of a triangle. However, we found no safe area in the deep white matter around the lateral ventricle. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  20. Cloud Computing Security in Openstack Architecture: General Overview

    OpenAIRE

    Gleb Igorevich Shakulo

    2015-01-01

    The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security c...

  1. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  2. MODELING OF PROCESSES OF OVERCOMING CONTRADICTIONS OF THE STATE AND ECONOMIC OPERATORS FOR THE SECURITY AND FACILITATION OF CUSTOMS PROCEDURES

    Directory of Open Access Journals (Sweden)

    Berezhnyuk Ivan

    2018-03-01

    Full Text Available Introduction. The issue of simultaneous provision of economic security of the state and simplification of customs procedures is actualized nowadays. The author of the study stressed the importance to create a «safe» business environment from the point of view of the customs sphere, which is based on «security», «justice» and «stability». Purpose. Development of methodical recommendations for modeling the processes of overcoming contradictions of the state and subjects of foreign economic activity in the field of security and simplification of customs procedures. Results. The research indicates that the appointment of revenue and fee bodies is the creation of favorable conditions for the development of foreign economic activity, ensuring the safety of society, protecting the customs interests of Ukraine. When performing customs duties by the SFS, the tasks assigned to them, aimed at ensuring the correct application, strict observance and prevention of non-compliance with the requirements of the Ukrainian legislation on state customs issues, may present risks that are inherently contradictory, conflicting in terms of the vector of action with respect to each other, namely: the probability of non-compliance by the subjects of foreign trade with the norms of customs legislation, or the creation of significant bureaucratic barriers in the process of economic operators. There is a peculiar conflict of interests between the state and the subjects of foreign economic activity. The main direction of creating a favorable business environment in accordance with the recommendations of WCO is the process of further simplification of customs procedures for subjects with a high degree of trust, fighting corruption and facilitating the movement of goods, vehicles and people in general. Conclusions. Thus, the scheme of «relations» between the state and the subjects of foreign economic activity can be modeled by the means of game theory, which is

  3. Provably Secure Password-based Authentication in TLS

    Energy Technology Data Exchange (ETDEWEB)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  4. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  5. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  6. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  7. Programmatic and technical requirements for the FMDP fresh MOX fuel transport package

    International Nuclear Information System (INIS)

    Ludwig, S.B.; Michelhaugh, R.D.; Pope, R.B.

    1997-12-01

    This document is intended to guide the designers of the package to all pertinent regulatory and other design requirements to help ensure the safe and efficient transport of the weapons-grade (WG) fresh MOX fuel under the Fissile Materials Disposition Program. To accomplish the disposition mission using MOX fuel, the unirradiated MOX fuel must be transported from the MOX fabrication facility to one or more commercial reactors. Because the unirradiated fuel contains large quantities of plutonium and is not sufficient radioactive to create a self-protecting barrier to deter the material from theft, DOE intends to use its fleet of safe secure trailers (SSTs) to provide the necessary safeguards and security for the material in transit. In addition to these requirements, transport of radioactive materials must comply with regulations of the Department of Transportation and the Nuclear Regulatory Commission (NRC). In particular, NRC requires that the packages must meet strict performance requirements. The requirements for shipment of MOX fuel (i.e., radioactive fissile materials) specify that the package design is certified by NRC to ensure the materials contained in the packages are not released and remain subcritical after undergoing a series of hypothetical accident condition tests. Packages that pass these tests are certified by NRC as a Type B fissile (BF) package. This document specifies the programmatic and technical design requirements a package must satisfy to transport the fresh MOX fuel assemblies

  8. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Directory of Open Access Journals (Sweden)

    Laura Pereira

    2015-05-01

    Full Text Available The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access, economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  9. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-01-01

    The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation. PMID:26030471

  10. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  11. Preventative maintenance plan for emergency pumping trailers

    International Nuclear Information System (INIS)

    Wiggins, D.D.

    1994-09-01

    The purpose/goal of this document is to identify the maintenance requirements and resources available to properly maintain the readiness and condition of the Emergency Pumping Equipment controlled by the Tank Waste Remediation System Tank Farms Plant Engineering and Tank Stabilization Operations. This equipment is intended to pump a single-shell tank (SST) that has been identified as an assumed leaking tank. The goal is to commence pumping (submersible or jet) as soon as safely possible after identifying a SST as an assumed leaking tank. Important information pertaining to the Emergency Pumping Equipment, Over-Ground Piping installation, and procedures is found in WHC-SD-WM-AP-005, ''Single Shell Tank Leak Emergency Pumping Guide.''

  12. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  13. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  14. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  15. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  16. 76 FR 2154 - Proposed Collection; Comment Request

    Science.gov (United States)

    2011-01-12

    ... Office of Management and Budget (``OMB'') for extension and approval. Like most issuers of securities... become subject to the advertising restrictions of the Securities Act of 1933, (15 U.S.C. 77) (the... and wish to advertise their securities, the Commission has previously adopted advertising safe harbor...

  17. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  18. Current Methods for Evaluation of Physical Security System Effectiveness.

    Science.gov (United States)

    1981-05-01

    nuclear fuel system installation in a - articular way. These entities are thereby identified as more or less significant targets for the security...These publications use non-standard definitions for some safe- guards terms, which is an unfortunate distraction . None of the publications we...when the participant reaches his objective. If this requires more than one time step, he may be distracted by changed circumstances before he completes

  19. Comparative Discourse Analysis of the Security-Privacy Dilemma: Salience of Security Issues in Printed Media

    Czech Academy of Sciences Publication Activity Database

    Guasti, Petra; Mansfeldová, Zdenka

    2015-01-01

    Roč. 30, č. 10 (2015), s. 127-156 ISSN 0254-0223 EU Projects: European Commission(XE) 285223 - SECONOMICS Institutional support: RVO:68378025 Keywords : security * media * stuxnet Subject RIV: AO - Sociology, Demography Impact factor: 0.444, year: 2015

  20. Power Product Equipment Technician: Outboard-Engine Boat Systems. Teacher Edition [and] Student Edition.

    Science.gov (United States)

    Hilley, Robert

    This curriculum guide contains teacher and student materials for a course on outboard-engine boat systems for power product equipment technician occupations. The course contains the following three units of instruction: (1) Orientation to Outboard-Engine Boat Systems and Rigging; (2) Trailers and Safe Towing and Boat Operation; and (3) Seasonal…

  1. DroidSafe

    Science.gov (United States)

    2016-12-01

    Massachusetts Avenue, Build E19-750 Cambridge , MA 02139-4307 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...Activity objects illustrating the challenges of points-to and information flow analysis...measure how many malicious flows Droid- Safe was able to detect). As these results illustrate , DroidSafe implements an analysis of unprece- dented

  2. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...

  3. Implementation of a security system in the radiotherapy process

    International Nuclear Information System (INIS)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-01-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  4. Simple steps to data encryption a practical guide to secure computing

    CERN Document Server

    Loshin, Peter

    2013-01-01

    Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what

  5. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  6. Safe havens in Europe

    DEFF Research Database (Denmark)

    Paldam, Martin

    2013-01-01

    Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11 countries are richer than their large neighbors. It is shown that causality is from small to safe haven to wealth, and that theoretically...... equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity...... of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds....

  7. Traveling Safely with Medicines

    Science.gov (United States)

    ... Medications Safely My Medicine List How to Administer Traveling Safely with Medicines Planes, trains, cars – even boats ... your trip, ask your pharmacist about how to travel safely with your medicines. Make sure that you ...

  8. Perceived Social Policy Fairness and Subjective Wellbeing: Evidence from China

    Science.gov (United States)

    Sun, Feng; Xiao, Jing Jian

    2012-01-01

    This study examined the relationship between perceived fairness of social policies and subjective well-being. Two types of policies examined were related to income distribution and social security. Subjective well-being was measured by work and life satisfaction. In addition, subjective well-beings between different income, age, and education…

  9. A comparative approach to nuclear safety and nuclear security

    International Nuclear Information System (INIS)

    2009-01-01

    The operators in charge of nuclear facilities or activities have to deal with nuclear and radiological risks, which implies implementing two complementary approaches - safety and security - each of which entails specific methods. Targeting the same ultimate purpose, these two approaches must interact to mutually reinforce each other, without compromising one another. In this report, IRSN presents its reflections on the subject, drawing on its expertise in assessing risks on behalf of the French safety and security authorities, together with the lessons learned from sharing experience at international level. Contents: 1 - Purpose and context: Definitions, Similar risks but different causes, Transparency and confidentiality, Synergy in dealing with sabotage, A common purpose: protecting Man and the environment; 2 - Organizational principles: A legislative and regulatory framework relative to safety as well as security, The competent nuclear safety and security authorities, A difference in the distribution of responsibilities between the operators and the State (Prime responsibility of operators, A different involvement of the State), Safety culture and security culture; 3 - Principles for the application of safety and security approaches: Similar design principles (The graded approach, Defence-in-depth, Synergy between safety and security), Similar operating principles (The same requirement regarding constant monitoring, The same need to take account of feedback, The same need to update the baseline, Sharing good practices is more restricted in the area of security, The need to deal with the respective requirements of safety and security), Similar emergency management (Developing emergency and contingency plans, Carrying out exercises), Activities subject to quality requirements; 4 - Conclusion

  10. ENTERPRISE ECONOMIC SECURITY: ESSENTIAL CHARACTERISTICS OF THE CONCEPT

    Directory of Open Access Journals (Sweden)

    Nina Avanesova

    2017-09-01

    Full Text Available The subjectmatter of the study is determining the essence of economic security. The aim is to systematize the approaches to the interpretation of the concept "enterprise economic security". The immediacy of the study is motivated by the lack of consistency, co-ordination and common views on the discourse in this area, as well as insufficiently substantiated offers for implementing modern methods and models of economic security management at all levels of economy. At the same time, despite a large number of publications, there remain many unsolved problems in the management of economic security, which is the main component of protection against threats, both at the state level and at the level of business entities such as enterprises and organizations. The following methods of theoretical and empirical research were used: logical generalization – to substantiate the relevance of the topic, the goals and objectives of the study, to determine the essential features of the problem; analysis and synthesis – to describe the theories of economic security. Economic security of an enterprise gives rise to a company’s capability to develop, increase its competitiveness and the competitiveness of its products, sustain its position on competitive markets, and characterizes the strength and economic potential of enterprises to counteract the negative impact of the external and internal environment. At the same time, the company’s economic security mirrors the conditions of its protection against any threats which are achieved due to the use of existing and potential resources of the company in order to ensure its safe operation in the long run.

  11. Towards the Development of a Methodology for the Cyber Security Analysis of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    In nuclear power plants the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. In case of an event, the failure of these systems has catastrophic consequences. The tendency in the industry over the past 10 years has been to use of commercial of the shelf (COTS) technologies in these systems. COTS software was written with attention to function and performance rather than security. COTS hardware usually designed to fail safe, but security vulnerabilities could be exploited by an attacker to disable the fail safe mechanisms. Moreover, the use of open protocols and operating systems in these technologies make the plants to become vulnerable to a host of cyber attacks. An effective security analysis process is required during all life cycle phases of these systems in order to ensure the security from cyber attacks. We are developing a methodology for the cyber security analysis of safety related nuclear digital I and C Systems. This methodology will cover all phases of development, operation and maintenance processes of software life cycle. In this paper, we will present a security analysis process for the concept stage of software development life cycle

  12. Information security system quality assessment through the intelligent tools

    Science.gov (United States)

    Trapeznikov, E. V.

    2018-04-01

    The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.

  13. Safe transport of radioactive material

    International Nuclear Information System (INIS)

    1990-01-01

    Recently the Agency redefined its policy for education and training in radiation safety. The emphasis is now on long-term strategic planning of general education and training programmes. In line with this general policy the Agency's Standing Advisory Group for the Safe Transport of Radioactive Material (SAGSTRAM) in its 7th meeting (April 1989) agreed that increased training activity should be deployed in the area of transport. SAGSTRAM specifically recommended the development of a standard training programme on this subject area, including audio-visual aids, in order to assist Member States in the implementation of the Agency's Regulations for the Safe Transport of Radioactive Material. This training programme should be substantiated by a biennial training course which is thought to be held either as an Interregional or a Regional Course depending on demand. This training manual, issued as a first publication in the Training Course Series, represents the basic text material for future training courses in transport safety. The topic areas covered by this training manual and most of the texts have been developed from the course material used for the 1987 Bristol Interregional Course on Transport Safety. The training manual is intended to give guidance to the lecturers of a course and will be provided to the participants for retention. Refs, figs and tabs

  14. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    Science.gov (United States)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  15. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  16. Serum trans-fatty acids level are positively associated with lower food security among american adults.

    Science.gov (United States)

    Mazidi, Mohsen; Vatanparast, Hassan

    2018-03-07

    In the current study we aimed to assess whether the food security is associated with serum trans-fatty acids (TFAs) and dietary fat. Analyses were restricted to participants (from the US National Health and Nutrition Examination Survey) with data available on serum and diet TFAs and food security status from 2009 to 2010. All statistical analyses (analysis of covariance and linear regression) accounted for the survey design and sample weights. We included 3876 participants, overall (48.6%) participants were men, and (51.4%) were women, generally (69.0%) had high food security. Subjects with higher food security had a higher level of education as well (p security (all p security. Further, age, sex, race, education, and energy intake adjusted mean of dietary fatty acids show that total polyunsaturated fatty acids are higher in subjects with higher food security (p = 0.026) while, cholesterol consumption is higher in subjects with lower food security (p = 0.039). Our findings provide more evidence on the association between food insecurity and the higher level of TFAs in serum and different type of fat in the diet.

  17. Analysis on the University’s Network Security Level System in the Big Data Era

    Science.gov (United States)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  18. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  19. 49 CFR 393.43 - Breakaway and emergency braking.

    Science.gov (United States)

    2010-10-01

    ... ACCESSORIES NECESSARY FOR SAFE OPERATION Brakes § 393.43 Breakaway and emergency braking. (a) Towing vehicle protection system. Every motor vehicle, if used to tow a trailer equipped with brakes, shall be equipped with... brake systems installed on towed vehicles shall be so designed, by the use of “no-bleed-back” relay...

  20. The cloud security ecosystem technical, legal, business and management issues

    CERN Document Server

    Ko, Ryan

    2015-01-01

    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key tho

  1. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  2. WNA position statement on safe management of nuclear waste and used nuclear fuel

    International Nuclear Information System (INIS)

    Saint-Pierre, S.

    2006-01-01

    This World nuclear association (W.N.A.) Position Statement summarizes the worldwide nuclear industry's record, progress and plans in safely managing nuclear waste and used nuclear fuel. The global industry's safe waste management practices cover the entire nuclear fuel-cycle, from the mining of uranium to the long-term disposal of end products from nuclear power reactors. The Statement's aim is to provide, in clear and accurate terms, the nuclear industry's 'story' on a crucially important subject often clouded by misinformation. Inevitably, each country and each company employs a management strategy appropriate to a specific national and technical context. This Position Statement reflects a confident industry consensus that a common dedication to sound practices throughout the nuclear industry worldwide is continuing to enhance an already robust global record of safe management of nuclear waste and used nuclear fuel. This text focuses solely on modern civil programmes of nuclear-electricity generation. It does not deal with the substantial quantities of waste from military or early civil nuclear programmes. These wastes fall into the category of 'legacy activities' and are generally accepted as a responsibility of national governments. The clean-up of wastes resulting from 'legacy activities' should not be confused with the limited volume of end products that are routinely produced and safely managed by today's nuclear energy industry. On the significant subject of 'Decommissioning of Nuclear Facilities', which is integral to modern civil nuclear power programmes, the W.N.A. will offer a separate Position Statement covering the industry's safe management of nuclear waste in this context. The safe management of nuclear waste and used nuclear fuel is a widespread, well-demonstrated reality. This strong safety record reflects a high degree of nuclear industry expertise and of industry responsibility toward the well-being of current and future generations

  3. Social security financing.

    Science.gov (United States)

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.

  4. Intelligent Security System connected to IoT

    OpenAIRE

    Lopes Goncalves Magalhaes, Frederic

    2017-01-01

    A home is a private place which means safe and secure. Everyone would like to keep an eye on his place but unfortunately doing it physically 24/7 is not possible. Fortunately, the technologies available nowadays can be used to create an automated third eye for those who want to keep a regular control on their home. Mobile Application has become common in many business sectors and is a trend as more and more people possess a smartphone. Then, with two major mobile application stores, Googl...

  5. Patient data security in the DICOM standard

    International Nuclear Information System (INIS)

    Schuetze, B.; Kroll, M.; Geisbe, T.; Filler, T.J.

    2004-01-01

    The DICOM committee added the section 'Security Profiles' to the DICOM standard, in order to provide the opportunity of safe communication between health care system partners. Data complying with the DICOM standard - e.g. pictures, signals or reports of examinations can be provided with one or more digital signatures. Attention should be paid to the fact that these possibilities of the DICOM standard are available or can be supplied subsequently by new acquisitions of radiological modalities. The required information to check these prerequisites are given

  6. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  7. Altered brain responses in subjects with irritable bowel syndrome during cued and uncued pain expectation.

    Science.gov (United States)

    Hong, J-Y; Naliboff, B; Labus, J S; Gupta, A; Kilpatrick, L A; Ashe-McNalley, C; Stains, J; Heendeniya, N; Smith, S R; Tillisch, K; Mayer, E A

    2016-01-01

    A majority of the subjects with irritable bowel syndrome (IBS) show increased behavioral and brain responses to expected and delivered aversive visceral stimuli during controlled rectal balloon distension, and during palpation of the sigmoid colon. We aimed to determine if altered brain responses to cued and uncued pain expectation are also seen in the context of a noxious somatic pain stimulus applied to the same dermatome as the sigmoid colon. A task-dependent functional magnetic resonance imaging technique was used to investigate the brain activity of 37 healthy controls (18 females) and 37 IBS subjects (21 females) during: (i) a cued expectation of an electric shock to the abdomen vs a cued safe condition; and (ii) an uncued cross-hair condition in which the threat is primarily based on context vs a cued safe condition. Regions within the salience, attention, default mode, and emotional arousal networks were more activated by the cued abdominal threat condition and the uncued condition than in the cued safe condition. During the uncued condition contrasted to the cued safe condition, IBS subjects (compared to healthy control subjects) showed greater brain activations in the affective (amygdala, anterior insula) and attentional (middle frontal gyrus) regions, and in the thalamus and precuneus. These disease-related differences were primarily seen in female subjects. The observed greater engagement of cognitive and emotional brain networks in IBS subjects during contextual threat may reflect the propensity of IBS subjects to overestimate the likelihood and severity of future abdominal pain. © 2015 John Wiley & Sons Ltd.

  8. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  9. 19 CFR 145.2 - Mail subject to Customs examination.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Mail subject to Customs examination. 145.2 Section 145.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) MAIL IMPORTATIONS General Provisions § 145.2 Mail subject to Customs...

  10. Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security

    Science.gov (United States)

    Jeanloz, Raymond

    2017-11-01

    Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.

  11. Socio-philosophical preconditions of formation of the concept of security in protosociology

    Directory of Open Access Journals (Sweden)

    L. V. Kalashnikova

    2016-08-01

    The development of the theory of security is impossible without taking into account the foundations of social and philosophical heritage in this area, which is often out of sight of researchers. Socio-philosophical prerequisites of security concept creates the necessary conditions for the formation of general ideas about it as an objective reality, the study of which with the use of scientific and special methods of knowledge allows us to formulate the basic laws, scientific system of safety management principles that will ensure the safe existence of the person, the effective functioning of society and the state.

  12. An application of a theory of planned behaviour to determine the association between behavioural intentions and safe road-crossing in college students: perspective from Isfahan, Iran.

    Science.gov (United States)

    Jalilian, Mohsen; Mostafavi, Firoozeh; Mahaki, Behzad; Delpisheh, Ali; Rad, Gholamreza Sharifi

    2015-07-01

    To identify the determinants of behavioural intention towards safe road-crossing among college students. The cross-sectional study was conducted in 2013-14 and comprised students of Isfahan University of Medical Sciences, Isfahan, Iran. A self-administrated questionnaire was distributed among the subjects related to road-crossing based on the theory of planned behaviour. Data was analysed using SPSS 21. Of the 300 questionnaires distributed, 278(92.66%) were returned completed. The mean age of the subjects was 23.16±3.66 years. There were 149(53.6%) females and 129(46.4%) males, with females crossing the street more safely than the males. There was a significant difference between the genders for subjective norms (p=0.001), perceived behavioural control (p=0.002) and behavioural intention (p=0.001), but no differences were traced with respect to attitude towards safe crossing (p=0.597). Results showed a direct and positive correlation between attitude towards safe crossing (r=0.276; p=0.001), subjective norms (r=0.368; p=0.001) and perceived behavioural control (r=0.419; p=0.000) with behavioural intention to safe crossing. The attitude towards safe crossing and perceived behavioural control had significant effect on behavioural intention among college students.

  13. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  14. 33 CFR 2.34 - Waters subject to tidal influence; waters subject to the ebb and flow of the tide; mean high water.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Waters subject to tidal influence; waters subject to the ebb and flow of the tide; mean high water. 2.34 Section 2.34 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL JURISDICTION Jurisdictional Terms § 2...

  15. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    Science.gov (United States)

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  16. Modeling Security Aspects of Network

    Science.gov (United States)

    Schoch, Elmar

    With more and more widespread usage of computer systems and networks, dependability becomes a paramount requirement. Dependability typically denotes tolerance or protection against all kinds of failures, errors and faults. Sources of failures can basically be accidental, e.g., in case of hardware errors or software bugs, or intentional due to some kind of malicious behavior. These intentional, malicious actions are subject of security. A more complete overview on the relations between dependability and security can be found in [31]. In parallel to the increased use of technology, misuse also has grown significantly, requiring measures to deal with it.

  17. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  18. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  19. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    Science.gov (United States)

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  20. A New Paradigm for Secure Social Lending

    Science.gov (United States)

    Serrelis, Emmanouil; Alexandris, Nikolaos

    Social Lending is one of the latest trends in Social Networking, offering a communication and financial channel between individual borrowers and lenders. The various Social Lending transaction schemes could be subject to multiple security threats, in both financial and technical terms, which could affect the integrity of the service as well as the trust of citizens. This paper provides an overview of the basic characteristics of Social Lending as well as an analysis the potential security issues suggesting some appropriate corrective measures. The ultimate target is to enforce the Social Lending effort with an information security foundation that could become an appreciable alternative to the "traditional" lending system.

  1. A Study on Visibility Rating of Several Representative Web-Safe Colors

    Science.gov (United States)

    Saito, Daisuke; Saito, Keiichi; Notomi, Kazuhiro; Saito, Masao

    This paper presents the visibility ordering of several web-safe colors. The research of web site visibility is important because of the rapid dissemination of the World Wide Web. The combination of a foreground color and a background color is an important factor in providing sufficient visibility. Therefore, the rating of color combination visibility is necessary when developing accessible web sites. In this study, the visibility of several web-safe color combinations was examined using psychological methodology, i.e., a paired comparison. Eighteen chromatic web-safe colors were employed for visual stimuli. Nine students ranging from ages 21 to 29 (average 23.7) were recruited, and all were with normal color sensation. These nine subjects looked at two different colored characters simultaneously on the white background and were instructed to identify which one enabled them to see more clearly. In examining the relationship between the psychological rankings of the color combinations and the visual sensations, each color combination was first scored as to the visibility by Thurstone's paired comparisons technique. Secondly, the visual sensation was deduced by applying Weber-Fechner's law to the luminance of the foreground colors. As results, the luminance of a foreground color influenced the visibility; however the visibility rating is difficult only using the luminance of web-safe colors. These indicate that the chromaticity and chroma saturation are necessary in rating of chromatic web-safe color visibility.

  2. SAFE Newsletter

    OpenAIRE

    2013-01-01

    The Center of Excellence SAFE – “Sustainable Architecture for Finance in Europe” – is a cooperation of the Center for Financial Studies and Goethe University Frankfurt. It is funded by the LOEWE initiative of the State of Hessen (Landes-Offensive zur Entwicklung wissenschaftlich-ökonomischer Exzellenz). SAFE brings together more than 40 professors and just as many junior researchers who are all dedicated to conducting research in support of a sustainable financial architecture. The Center has...

  3. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  4. Battle for Ulster. A Study of Internal Security

    Science.gov (United States)

    1987-06-01

    Socialist Republic. Consistent with- this new political, orientation, the IRA broke the long tradition of " abstentionism ," backing the candidacy...on subjects relating to US national security. Each year, the National Defense University, through the Institute for Na- tional Strategic Studies, hosts...about two dozen Senior Fellows who engage in original research on national security issues. NDU Press publishes the best of this research. In

  5. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  6. Security challenges in designing I and C systems for nuclear power plant

    International Nuclear Information System (INIS)

    Behera, Rajendra Prasad; Jayanthi, T.; Madhusoodanan, K.; Satya Murty, S.A.V.

    2016-01-01

    Geographically distributed instrumentation and control (I and C) systems in any nuclear power plant (NPP) facilitate the operator with remote access to real-time data and issue supervisory command to remote control devices deployed in the field. The increased connectivity to plant communication network has exposed I and C systems to security vulnerabilities both in terms of physical and logical access. For example, denial-of service and fault induction attack can disrupt the operation of I and C systems by delaying or blocking the flow of data through plant communication network. The design process of I and C system is quite challenging since an engineer has to consider both safety and security features implemented in hardware and software components of the system. This paper analyzes attack taxonomy based on available data and presents Security Tree Analysis (STA) technique towards building safe and secures I and C systems for Nuclear Power Plant. (author)

  7. Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa.

    Science.gov (United States)

    Okeke, Sunday O; Mabuza, Langalibalele H

    2017-10-27

    For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to.Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28-47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees' safety (p < 0.0001). HCPs had positive perceptions regarding the hospital's security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities' concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them.

  8. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  9. A safe and accurate method to perform esthetic mandibular contouring surgery for Far Eastern Asians.

    Science.gov (United States)

    Hsieh, A M-C; Huon, L-K; Jiang, H-R; Liu, S Y-C

    2017-05-01

    A tapered mandibular contour is popular with Far Eastern Asians. This study describes a safe and accurate method of using preoperative virtual surgical planning (VSP) and an intraoperative ostectomy guide to maximize the esthetic outcomes of mandibular symmetry and tapering while mitigating injury to the inferior alveolar nerve (IAN). Twelve subjects with chief complaints of a wide and square lower face underwent this protocol from January to June 2015. VSP was used to confirm symmetry and preserve the IAN while maximizing the surgeon's ability to taper the lower face via mandibular inferior border ostectomy. The accuracy of this method was confirmed by superimposition of the perioperative computed tomography scans in all subjects. No subjects complained of prolonged paresthesia after 3 months. A safe and accurate protocol for achieving an esthetic lower face in indicated Far Eastern individuals is described. Copyright © 2016 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  10. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    balance between managing sources safely and securely, while still enabling them to be used by authorized personnel without undue hindrance. Thus the level of security should be commensurate with the potential hazard posed by the source, recognizing the need to ensure appropriate use of the source for beneficial purposes

  11. SOME INSIGHTS ON ROADWAY INFRASTRUCTURE DESIGN FOR SAFE ELDERLY PEDESTRIAN TRAVEL

    Directory of Open Access Journals (Sweden)

    Venkataraman N. SHANKAR

    2006-01-01

    We obtained these results through the use of Bayesian analysis. Bayesian analysis allows us to use subjective prior information on the distribution of parameters in combination with information from the observed data. The advantage of Bayesian analysis in the assessment of key road variables on safe elderly travel is that we can examine the robustness of results.

  12. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  13. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  14. Education and training on nuclear security in Greece

    International Nuclear Information System (INIS)

    Pafilis, C. N.; Kamenopoulou, V.; Maltezos, A.; Seferlis, S.; Dimitriou, P.; Matikas, T. E.

    2009-01-01

    The Greek Atomic Energy Commission is the competent authority responsible for designing, implementing and supervising the radiation protection programme in Greece. According to its statutory law one of its main responsibilities is the provision of education and training to people involved in the national emergency response plan against nuclear and radiological threats. Due to the high requirements demanded for the safe conduct of the Athens 2004 Olympic Games, a nuclear security programme was established and the nuclear security infrastructure of the country was upgraded. Under this framework, GAEC provided training on radiation protection, prevention, detection, emergency preparedness and response to the personnel involved in the emergency plan. Since that time, the GAEC continues to organize seminars frequently addressed to the organizations involved in the emergency plan, in order to establish the sustainability of national operational capability on preparedness and response. (authors)

  15. Survey of main challenges (security and privacy in wireless body area networks for healthcare applications

    Directory of Open Access Journals (Sweden)

    Samaher Al-Janabi

    2017-07-01

    Full Text Available Wireless Body Area Network (WBAN is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.

  16. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  17. Affordable and Secure Nuclear Energy Development: DOE Investments and Laboratory R&D Challenges - A Review

    Energy Technology Data Exchange (ETDEWEB)

    Dasari, Venkateswara Rao [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-12-20

    The need for sustainable and secure nuclear energy is summarized. Driven by economics and public-private partnerships, the technology is evolving. Cost control and regulatory simplification are needed for a nuclear renaissance. Small modular reactors--simple, scalable, and inherently safe--may be the future.

  18. The world in a box? Food security, edible insects, and "One World, One Health" collaboration

    NARCIS (Netherlands)

    Yates-Doerr, E.

    2015-01-01

    Scientists in the Netherlands are cultivating edible insects to address concerns of international food security. Committed to the One World, One Health (OWOH) movement, their research aims to create a safe and effective global solution to the conjoined problems of climate change and an increasing

  19. Used fuel extended storage security and safeguards by design roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Durbin, Samuel G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lindgren, Eric Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Robert [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Ketusky, Edward [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); England, Jeffrey [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Scherer, Carolynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dunn, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. A set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.

  20. Handling small arbovirus vectors safely during biosafety level 3 containment: Culicoides variipennis sonorensis (Diptera:Ceratopogonidae) and exotic bluetongue viruses.

    Science.gov (United States)

    Hunt, G J; Tabachnick, W J

    1996-05-01

    Equipment and procedures are described for biosafety level 3 (BL-3) containment work with small, zoophilic arthropods. BL-3 classified pathogens always must be manipulated in biological safety cabinets. Procedures, including physical barriers and handling methods, that prevent the escape of potentially virus-infected insects are discussed, and the use of a monitoring system for insect security is explained. The inability to recover escaped minute, flying insects poses a major difference from similar work with larger insects, such as mosquitoes. Methods were developed for the safe and secure handling of Culicoides variipennis sonorensis Wirth & Jones infected with exotic bluetongue viruses during BL-3 containment.

  1. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  2. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS)

    International Nuclear Information System (INIS)

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-01-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework

  3. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    Science.gov (United States)

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  4. Romania and the New Cold War Security Challenges

    Science.gov (United States)

    2017-06-09

    Rossisskiy” refers to citizens of the Russian Federation.199 The Moscow objective is to protect these populations and at the same time to gain influence over...social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...the nation and the organization that is part of. 15. SUBJECT TERMS National security strategy, Russian way of war, Russian influence in Romania

  5. Counterproliferation, Border Security and Counterterrorism Subject-Related Laws and Regulations, Including Export Control Regimes in South-Eastern European Countries

    International Nuclear Information System (INIS)

    Bokan, S.

    2007-01-01

    gaps exist, much less fill them. All this suggests that, to fulfil obligations under UNSC Resolutions 1540 and 1373, States must enact harmonized criminal prohibitions and authorization for law enforcement cooperation in order to establish a seamless web of security among all nations. Failure to do so implicitly poses a threat to international peace and security. One of the main issues which deserve to be further addressed and which prompts the continuation of the Southeast Europe Counterproliferation, Borger Security and Counterterrorism (CBSC) Working Group is to harmonize national laws and regulations that deal with deterring, detecting and interdicting WMD. Inventory of relevant CBSC subject-related laws of the Southeast Europe countries, including Export Control Laws was created and prepared for further consideration and harmonization by judiciary experts, with the aim to develop m odel laws . Let me very briefly present you the main features of the SEDM CBSC subject-related laws and regulations. This paper will present that inventory which includes the membership in the international Conventions, Treaties and Arrangements and also the membership in Multilateral Export Control Regimes of Southeast Europe countries. Also, it will be presented the membership in the international legal instruments that play an integral part in the global fight against terrorism. (author)

  6. 77 FR 34436 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-11

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Temporarily... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange... Clearing and Outsourcing Solutions, Inc. (``Apex Clearing'') as an ISE member organization, subject to Apex...

  7. Software Implementation of Secure Firmware Update in IoT Concept

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2017-01-01

    Full Text Available This paper focuses on a survey of secure firmware update in the Internet of Things, design and description of safe and secure bootloader implementation on RFID UHF reader, encryption with AES-CCM and versioning with use of external backup flash memory device. In the case of problems with HW compatibility or other unexpected errors with new FW version, it is possible to downgrade to previous FW image, including the factory image. Authentication is provided by the UHF RFID service tag used to extract unique initialization vector of the encryption algorithm for each update session. The results show slower update speed with this new upgrade method of approximately 27% compared to older one, using the only AES-CBC algorithm.

  8. Being in a safe and thus secure place, the core of early labour: A secondary analysis in a Swedish context

    Science.gov (United States)

    Carlsson, Ing-Marie

    2016-01-01

    Background Early labour is the very first phase of the labour process and is considered to be a period of time when no professional attendance is needed. However there is a high frequency of women who seek care at the delivery wards during this phase. When a woman is admitted to the delivery ward, one role for midwives is to determine whether the woman is in established labour or not. If the woman is assessed as being in early labour she will probably then be advised to return home. This recommendation is made due to past research that found that the longer a woman is in hospital the higher the risk for complications for her and her child. Women have described how this situation leaves them in a vulnerable situation where their preferences are not always met and where they are not always included in the decision-making process. Aim The aim of this study was to generate a theory based on where a woman chooses to be during the early labour process and to increase our understanding about how experiences can differ from place to place. Methods The method was a secondary analysis with grounded theory. The data used in the analysis was from two qualitative interview studies and 37 transcripts. Conclusion The findings revealed a substantive theory that women needed to be in a safe and thus secure place during early labour. This theory also describes the interplay between how women ascribed their meaning of childbirth as either a natural live event or a medical one, how this influenced where they wanted to be during early labour, and how that chosen place influenced their experiences of labour and birth. PMID:27172510

  9. DETERMINANTS OF HOUSEHOLD FOOD SECURITY: A COMPARATIVE ANALYSIS OF EASTERN AND WESTERN INDONESIA

    Directory of Open Access Journals (Sweden)

    Puspi Eko Wiranthi

    2014-04-01

    Full Text Available Indonesian Food Security Council in 2009 issued a Food Security and Vulnerability Atlas (FSVA which stated that there were 100 districts in Indonesia which were most vulnerable to food insecurity and 79% of which were located in eastern region. By using Susenas regular data in 2008, this study aimed to analyze determinants of household food security in eastern compared to western region. The ordered logistic regression model was employed to investigate the determinants of household food security. The result showed that most of households in Indonesia were vulnerable to food insecurity (41.76%. The percentage in eastern region (48.56% was higher than that in western region (41.76%. Increase in expenditure equivalent, age and education level of household head, female household head, small household size, household head’s occupation in non-agriculture and urban household would increase the probability of a household to become food secure in both regions. The difference was in the factor of access to electricity in eastern and access to safe drinking water and loan in western region. Policies which aim to increase education, credit access, and intensive family planning have big roles in improving household food security.

  10. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.

    Science.gov (United States)

    Zandona, David J; Thompson, Jon M

    In the past decade, public and private organizations have experienced a significant and alarming rise in the number of data breaches. Across all sectors, there seems to be no safe haven for the protection of information. In the health care industry, the trend is even worse. Information security is at an unbelievable low point, and it is unlikely that government oversight can fix this issue. Health care organizations have ramped up their approaches to addressing the problem; however, these initiatives are often incremental rather than transformational. Hospitals need an overall organization-wide strategy to prevent breaches from occurring and to minimize effects if they do occur. This article provides an analysis of the literature related to health information security and offers a suggested strategy for hospital administrators to follow in order to create a more secure environment for patient health information.

  11. 77 FR 20536 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Science.gov (United States)

    2012-04-05

    ... provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as well as exempt these... swaps from all provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as... the Securities Act, except the anti-fraud provisions of Section 17(a), subject to certain conditions...

  12. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Science.gov (United States)

    2011-06-15

    ... from all provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as well... provisions of the Securities Act, except the anti- fraud provisions of Section 17(a), subject to certain... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639...

  13. Stolen Vehicles for Export: A Major Concern for Domestic and International Security

    Science.gov (United States)

    2018-03-01

    xi LIST OF ACRONYMS AND ABBREVIATIONS AES Automated Export System BEST Border Enforcement Security Task Force CSI Container Security Initiative...motor vehicles, increase inspections of exports, and enhance enforcement capabilities. Unfortunately, this thesis was unable to establish a clear link...and a better understanding could only benefit law enforcement’s efforts to counter it. 14. SUBJECT TERMS Border Enforcement Security Task Force

  14. What Isn't Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2011-01-01

    The year 2011 marks the 50th anniversary of the first IAEA regulations governing the transport of radioactive material. However transport safety at the IAEA obviously predates this, since the regulations took time to develop. In 1957, GC. 1/1 already states: 'The Agency should undertake studies with a view to the establishment of regulations relating to the international transportation of radioactive materials. ...'. And goes further: 'The transport of radioisotopes and radiation sources has brought to light many problems and involves the need for uniform packaging and shipping regulations ... facilitate the acceptance of such materials by sea and air carriers'. This conference reiterates the challenge given then through the sub-title 'The next fifty years - Creating a Safe, Secure and Sustainable Framework'. Looking back, we can see that the sustainable framework was a goal in 1957, where radioactive material could be transported should it be desired. Since these early days we have added to safety the need to ensure security. However we still see the same calls today to eradicate denial of shipment, which might suggest we have not progressed. But the picture today is very different - we have today well established requirements for safe transport of radioactive material, and the recommendations for security in transport are coming of age for all radioactive materials. The outstanding issue would seem to be harmonisation, not just between safety and security in IAEA documents, but also harmonisation between Member States.

  15. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  16. Prediction of safe driving Behaviours based on health belief model: the case of taxi drivers in Bandar Abbas, Iran.

    Science.gov (United States)

    Razmara, Asghar; Aghamolaei, Teamur; Madani, Abdoulhossain; Hosseini, Zahra; Zare, Shahram

    2018-03-20

    Road accidents are among the main causes of mortality. As safe and secure driving is a key strategy to reduce car injuries and offenses, the present research aimed to explore safe driving behaviours among taxi drivers based on the Health Belief Model (HBM). This study was conducted on 184 taxi drivers in Bandar Abbas who were selected based on a multiple stratified sampling method. Data were collected by a questionnaire comprised of a demographic information section along with the constructs of the HBM. Data were analysed by SPSS ver19 via a Pearson's correlation coefficient and multiple regressions. The mean age of the participants was 45.1 years (SD = 11.1). They all had, on average, 10.3 (SD = 7/5) years of taxi driving experience. Among the HBM components, cues to action and perceived benefits were shown to be positively correlated with safe driving behaviours, while perceived barriers were negatively correlated. Cues to action, perceived barriers and perceived benefits were shown to be the strongest predictors of a safe drivers' behaviour. Based on the results of this study in designing health promotion programmes to improve safe driving behaviours among taxi drivers, cues to action, perceived benefits and perceived barriers are important. Therefore, advertising, the design of information campaigns, emphasis on the benefits of safe driving behaviours and modification barriers are recommended.

  17. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  18. The anatomy of the 'feeling of security' towards nuclear power generation plants. A survey of the image of 'security' (anshin)

    International Nuclear Information System (INIS)

    Sakai, Yukimi; Morikawa, Shin'ichi; Hafsi, Med; Ohashi, Tomoki

    2003-01-01

    To better understand how people feel secure towards nuclear power generation plants, three surveys were conducted using three different methods. In the first study, a 'word association questionnaire' was used to determine what do people associate with the word 'security', or anshin. The results revealed that the respondents tended to associate with this work principally a number of situations in which they feel protected, calm and stable. In the second study, which was conducted using rating scales, it was found that the respondents were likely to perceive security based on subjectively formed opinions, and on the result of their interaction with others. The rating scale method was also used in the third study whose purpose was to examine the influence of the respondent's pre-formed image on their feeling of security. The findings of this study showed that the feeling of confidence, and images of peace and security tended to strongly influence the respondent's feeling of security. It was therefore concluded that the respondent's feeling of security towards power generation plants is largely determined by his/her perception that the staffs working in the plant are really always committed to their task of ensuring safety in the plant. (author)

  19. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    International Nuclear Information System (INIS)

    Dare, J. H.; Cournoyer, M. E.

    2002-01-01

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases

  20. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    Energy Technology Data Exchange (ETDEWEB)

    Dare, J. H.; Cournoyer, M. E.

    2002-02-26

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases.

  1. SAFETY AND SECURITY MEASURES ADOPTED BY THE HOTELS AND THEIR IMPACT ON CUSTOMER RELATIONSHIP MANAGEMENT

    OpenAIRE

    Abhishek Chauhan; Ankit Shukla; Pradeep Negi

    2018-01-01

    Hotel can be defined as “Home away from home” for the guests who come to the hotel as they receive homely environment and services in the hotel. The guests who come to the hotels come with an understanding that they and their belongings would be safe and secured in the hotel during their occupancy in the hotel. The safety and security aspects play a very vital role in hospitality industry as this industry is dependent largely on the customer relationship with the hotel. If the guest encounter...

  2. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  3. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  4. Review of Safety and Security of Radioactive Sources in Africa

    International Nuclear Information System (INIS)

    Kiti, Shadrack Anthony; Choi, Kwang Sik

    2011-01-01

    Radioactive materials are used worldwide for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported therefore trans-boundary movement is a significant factor in consideration of safety and security measures during movement of these sources. It is estimated that 20 million packages of radioactive materials are transported annually worldwide and this number of shipments is expected to increase due to the renaissance of nuclear power generation. The African continent has shown considerable leadership in its advocacy for the safety and security of radioactive sources. The First Africa Workshop on the Establishment of a Legal Framework governing Radiation Protection, the Safety of Radiation Sources and the Safe Management of Radioactive Waste held in Ethiopia in 2001 called upon the IAEA to form a forum for African countries to consider the Code of Conduct on the Safety and Security of Radioactive Sources and give it a legally binding effect so that the peaceful use of nuclear technology is not compromised. Despite these laudable efforts, Africa still faces considerable challenges in the implementation of safety and security of radioactive sources because of weak regulatory control and lack of infrastructure to properly control, manage and secure radiation sources 1 . The purpose of this paper was therefore, to analyze, review, address and share knowledge and experience with regard to safety and security measures of radioactive materials in Africa. This project will benefit IAEA's African member states in creating nuclear safety and security networking in the region

  5. How safe is safe?

    International Nuclear Information System (INIS)

    Hughes, C.F.; Flood, M.

    1996-01-01

    Full text: The Australian Register of Therapeutic Goods lists over 25,000 medical device types currently supplied to Australian consumers. It is widely assumed that all goods listed on this register have been fully evaluated for safety and efficacy by the Therapeutic Goods Administration. However, only 1,010 devices are registered and thereby subject to full premarket evaluation. Five classes of registerable devices were arbitrarily assigned in 1986 based on overseas experience (Canada and the USA) and the work of several Advisory Panels convened by the then Minister of Health, Dr Neal Blewett. Some products have been removed from registerable categories, while others have been added. These decisions were made after reviewing device performance and problems. In May 1987, the Therapeutic Device Evaluation Committee (TDEC) and the Therapeutic Goods Administration introduced the Australian Therapeutic Device Problem Reporting Scheme. Under this scheme, any interested person can report medical device related problems to the Department for investigation. Each problem is investigated, a cause and/or outcome assigned and appropriate action is taken. Analysis of problem reports received indicates that no regulatory action was necessary in 34% of investigations. However, 24% of products required product improvement and recalls and/or safety alerts were issued for approximately 10% of problems investigated. In only 5% was the problem not confirmed by departmental investigation. The actual effect of the problem reported was temporary or minor injury in 10% of patients. In 2%, death or serious injury resulted. Forty-four percent of problems did not lead to patient injury at all and in 44% the problem was not related to the patient and/or his well being. However, the potential effect of death or serious injury was present in 17% of device problems. In 26% of reported events, temporary or minor injury could have occurred. Specific device related problems include the Bjork Shiley

  6. Safe transport of radioactive material. Second edition

    International Nuclear Information System (INIS)

    1991-01-01

    The transport of radioactive material embraces the carriage of radioisotopes for industrial, medical and research uses, and the movement of waste, in addition to consignments of nuclear fuel cycle material. It has been estimated that between eighteen and thirty-eight million package shipments take place each year. On the recommendation of the Standing Advisory Group on the Safe Transport of Radioactive Material (SAGSTRAM), which enjoys wide representations from the Agency's Member States and international organizations, the Secretariat is preparing a training kit comprising this training manual and complementary visual aids. The kit is intended to be the basis for an extensive course on the subject and can be used in whole or in part for inter-regional, regional and even national training purposes. Member States can thus benefit from the material either through training courses sponsored by the Agency, or, alternatively, organized by themselves. As a step towards achieving that goal, the current training manual was compiled using material from the first Inter-Regional Training Course on the Safe Transport of Radioactive material that was held in co-operation with the Nuclear Power Training Centre of the then Central Electricity Generating Board at Bristol, United Kingdom. This Manual was initially published in 1990. On the recommendation of the Agency's Standing Advisory Group on the Safe Transport of Radioactive Material (SAGSTRAM), the Manual has since been expanded and updated in time for the second Inter-Regional Training Course, that will in 1991 similarly be held in Bristol. Refs, figs, tabs

  7. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  8. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  9. Interplay of a multiplicity of security features

    Science.gov (United States)

    Moser, Jean-Frederic

    2000-04-01

    The great variety of existing security features can cause difficulty in choosing the adequate set for a particular security document. Considering the cost/benefit aspects with respect to the overall protection performance requested, a choice has to be made, for example, between either few features of high-security value or numerous many, less- resistant features. Another choice is the high versus low complexity of one particular features. A study aimed at providing a decision basis is a challenging matter because it involves human factors. Attention, perception, physiology of seeing and habits - to name some of the factors - are intangibles and are subject to evaluations involving normally a great number of experiments, if they are to be representative. The opportunity was given for a case study with the introduction of new Swiss banknotes between 1995 and 1998, because the new banknotes represent a novelty in the sense of the multiplicity and interplay of its optical security features. We have analyzed 652 articles which appeared in the press media concerning the new banknotes, seeking especially for peoples' reaction towards the security features.

  10. Security of supply and regulation of energy networks

    International Nuclear Information System (INIS)

    Jamasb, Tooraj; Pollitt, Michael

    2008-01-01

    In recent years, the security of energy supplies has re-emerged as a central issue in the energy policy arena in the UK and elsewhere. This re-emergence takes place against a backdrop of increased liberalisation of the energy markets, so that security of supply needs to be revisited within this context. Security of supply is multifaceted, but is often discussed in terms of physical availability of energy sources and their commodity price risk. This paper discusses the relationship between security of supply and network regulation - that is, how the energy networks, and appropriate regulation of them, can contribute to security of supply in liberalised energy sectors. Energy networks are predominantly natural monopolies and as a result are generally subject to regulatory oversight. We discuss a range of issues and trends that pose challenges and opportunities to network regulation and which call for new and innovative measures. The paper identifies a number of areas where network regulation can play a significant role in increasing the security of supply of future energy systems. (author)

  11. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  13. Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids

    Directory of Open Access Journals (Sweden)

    Sarmadullah Khan

    2018-03-01

    Full Text Available Microgrids play an important role in today’s power systems as the distributed generation is becoming increasingly common. They can operate in two possible modes: (i standalone and (ii grid-connected. The transitional state from standalone to grid-connected mode is very critical and requires the microgrid to be synchronized with the main grid. Thus, secure, reliable and trustworthy control and communication is utmost necessary to prevent out-of-sync connection which could severely damage the microgrid and/or the main grid. Existing solutions consume more resources and take long time to establish a secure connection. The objective of the proposed work is to reduce the connection establishment time by using efficient computational algorithms and save the resources. This paper proposes a secure authentication and key establishment mechanism for ensuring safe operation and control of the microgrids. The proposed approach uses the concept of Elgamal with slight modification. Private key of the sender is used instead of a random number. The proposed modification ensures the non repudiation. This paper also presents a system threat model along with security network architecture and evaluates the performance of proposed algorithm in protecting microgrid communication against man in the middle attacks and replay attacks that could delay the packets to damage the system and need to be detected. Mathematical modeling and simulation results show that the proposed algorithm performs better than the existing protocols in terms of connection establishment, resource consumption and security level.

  14. Spark-safe mechanical fluctuation sensor

    Energy Technology Data Exchange (ETDEWEB)

    Retek, S; Galisz, T

    1979-04-20

    The subject of the invention is a mechanical fluctuation sensor in a spark-safe design for use at mines which are dangerous for gas, as an element of different systems for remote control information transfer. The patented sensor of mechanical fluctuations contains: magnetic-induction transformer characterized by the fact that its inert mass consists of a plane permanent magnet placed in the suspended state on springs between 2 coils, which together with their cores are rigidly fixed to the walls of the ferromagnetic vessels. The ends of the coil windings are interconnected, while the beginnings of the windings are lead out with connection to the outlet of the electronic amplifier with binary outlet signal. The electronic amplifier is placed between the transformer in the common ferromagnetic housing which is a screen for protection from the effect of external magnetic fields.

  15. Capacity Credit and Security of Supply

    DEFF Research Database (Denmark)

    Chozas, Julia Fernandez; Mathiesen, Brian Vad

    2015-01-01

    electricity systems are planned, and how renewable energies fit in these systems. The second part of the article assesses the actual contribution that variable renewable energies can make to security of supply, firstly from a qualitative point of view and secondly in measurable terms. The study is based......This paper addresses the question of how renewable energies can contribute to security of supply. In order to analyse this subject, the paper has two differentiated parts. In the first part, the concept of security of supply is reviewed. This provides the baseline to understand how current...... demand for electricity is highest, the study focuses on the capacity credit of future Danish scenarios including high penetrations of offshore wind, onshore wind, wave and solar PV. The results of this project can ultimately lead towards the improvement of existing rules and methods in system planning...

  16. openPDS: protecting the privacy of metadata through SafeAnswers.

    Directory of Open Access Journals (Sweden)

    Yves-Alexandre de Montjoye

    Full Text Available The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1 we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2 we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research.

  17. CLARUS as a Cloud Security Framework: e-Health Use Case.

    Science.gov (United States)

    Vidal, David; Iriso, Santiago; Mulero, Rafael

    2017-01-01

    Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.

  18. THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS

    Directory of Open Access Journals (Sweden)

    Vasyl P. Oleksiuk

    2017-12-01

    Full Text Available In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of the future computer science teachers' study in the context of developing of their competences necessary for safe students’ activity in the computer networks and Internet. Particular attention is paid to the threats arising after introduction cloud technologies various service models into the educational process. The article focuses on methods and stages of the pedagogical investigation of correlation between the operational and reflective components of the professional competencies of future computer science teachers.

  19. Secured Transactions: An Integrated Classroom Approach Using Financial Statements and Acronyms

    Science.gov (United States)

    Seganish, W. Michael

    2005-01-01

    Students struggle with the subject of secured transactions under the Uniform Commercial Code. In this article, the author presents a method that uses balance-sheet information to help students visualize the difference between secured and unsecured creditors. The balance sheet is also used in the Uniform Commercial Code process, in which one must…

  20. Los epitextos virtuales en la difusión del libro infantil: Hacia una poética del book-trailer. Un modelo de análisis

    Directory of Open Access Journals (Sweden)

    Rosa Tabernero-Sala

    2016-01-01

    Full Text Available En el marco de la definición del book-trai - ler como epitexto virtual en la categoría de paratexto incorporado (Gray, 2010 o de lite - ratura digital en aumento (Unsworth, 2006, en este trabajo presentamos el análisis de las principales características del book-trai - ler partiendo del estudio de un corpus de 80 ejemplos seleccionados del material que apa - rece en la red. De este análisis se desprende - rá una serie de categorías que constituirán las referencias necesarias para analizar un book-trailer desde los parámetros de calidad y de la alfabetización multimodal. Asimismo ejemplificamos el modelo de análisis con el objeto de constatar su paradigma.