WorldWideScience

Sample records for secrecy protection

  1. Protecting knowledge : How legal requirements to reveal information affect the importance of secrecy

    NARCIS (Netherlands)

    Sofka, Wolfgang; de Faria, Pedro; Shehu, Edlira

    2018-01-01

    Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical foundations for secrecy have not been well explored. We extend knowledge protection literature and propose theoretical mechanisms explaining how information visibility influences the importance of

  2. Protecting traditional knowledge - Does secrecy offer a solution ...

    African Journals Online (AJOL)

    ... their traditional knowledge. This paper reviews the concerns that may arise when holders of traditional knowledge attempt to rely on claiming unfair competition and contract laws to protect their traditional knowledge. Keywords: Traditional knowledge; TRIPS Agreement; unfair competition; confidential information; secrecy.

  3. THE RIGHT TO SECRECY OF COMMUNICATIONS - SITUATIONS AND CHALLENGES

    OpenAIRE

    Biljana Karovska-Andonovska

    2014-01-01

    In this paper, the basic elements of the right to secrecy of communications are presented. We analyzed the treatment of this fundamental right in international documents on human rights and in the constitutions of modern democracies. Also, we established the scope of protection of the confidentiality of certain types of communication. Moreover, we have identified the parts of the process of speech and written communication whose secrecy is protected in accordance wi...

  4. THE RIGHT TO SECRECY OF COMMUNICATIONS - SITUATIONS AND CHALLENGES

    Directory of Open Access Journals (Sweden)

    Biljana Karovska-Andonovska

    2014-10-01

    Full Text Available In this paper, the basic elements of the right to secrecy of communications are presented. We analyzed the treatment of this fundamental right in international documents on human rights and in the constitutions of modern democracies. Also, we established the scope of protection of the confidentiality of certain types of communication. Moreover, we have identified the parts of the process of speech and written communication whose secrecy is protected in accordance with international standards. Special attention is devoted to the contemporary challenges facing the respect the secrecy of communications. In this regard, we analyzed the impact of the expansion of modern communication technologies on the confidentiality of communication. As a special challenge we analyzed the application of new methods for dealing with security threats on a national and global level, which among other things include interception of communications to collect information and evidence of involvement in criminal activities.

  5. Protecting knowledge

    DEFF Research Database (Denmark)

    Sofka, Wolfgang; de Faria, Pedro; Shehu, Edlira

    2018-01-01

    Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical foundations for secrecy have not been well explored. We extend knowledge protection literature and propose theoretical mechanisms explaining how information visibility influences the importance...... of secrecy as a knowledge protection instrument. Building on mechanisms from information economics and signaling theory, we postulate that secrecy is more important for protecting knowledge for firms that have legal requirements to reveal information to shareholders. Furthermore, we argue that this effect...... and a firm's investment in fixed assets. Our findings inform both academics and managers on how firms balance information disclosure requirements with the use of secrecy as a knowledge protection instrument....

  6. Openness versus Secrecy in Scientific Research Abstract.

    Science.gov (United States)

    Resnik, David B

    2006-02-01

    Openness is one of the most important principles in scientific inquiry, but there are many good reasons for maintaining secrecy in research, ranging from the desire to protect priority, credit, and intellectual property, to the need to safeguard the privacy of research participants or minimize threats to national or international security. This article examines the clash between openness and secrecy in science in light of some recent developments in information technology, business, and politics, and makes some practical suggestions for resolving conflicts between openness and secrecy."By academic freedom I understand the right to search for the truth and to publish and teach what one holds to be true. This right also implies a duty; one must not conceal any part of what one has recognized to be true. It is evident that any restriction of academic freedom serves to restrain the dissemination of knowledge, thereby impeding rational judgment and action."Albert Einstein, quotation inscribed on his statute in front of the National Academy of Sciences, Washington, DC.

  7. Bringing Secrecy into the Open

    DEFF Research Database (Denmark)

    Costas, Jana; Grey, Christopher

    2014-01-01

    This paper brings into focus the concept of organizational secrecy, defined as the ongoing formal and informal social processes of intentional concealment of information from actors by actors in organizations. It is argued that existing literature on the topic is fragmented and predominantly...... focused on informational rather than social aspects of secrecy. The paper distinguishes between formal and informal secrecy and theorizes the social processes of these in terms of identity and control. It is proposed that organizational secrecy be added to the analytical repertoire of organization studies....

  8. Secrecy Jurisdictions

    OpenAIRE

    Schjelderup, Guttorm

    2015-01-01

    This paper surveys tax haven legislation and links the literature on tax havens to the literature on asymmetric information. I argue that the core aim of tax haven legislation is to create private information (secrecy) for the users of tax havens. This leads to moral hazard and transaction costs in non-havens. The business model of tax havens is illustrated by using Mauritsius and Jersey as case studies. I also provide several real world examples of how secrecy jurisdictions le...

  9. Secrecy and misguided policy

    Energy Technology Data Exchange (ETDEWEB)

    Rossin, A D [Center for International Security and Cooperation, Stanford, California (United States)

    2001-07-01

    The atomic bomb was born in secrecy. After the war, scientists and statesmen committed themselves to develop the promise of nuclear energy without the proliferation of nuclear weapons. The most obvious tool available to them was secrecy. But secrecy was not the sword that could easily be beaten into the plowshare. It proved to be a double-edged sword. It could not stop the spread of basic scientific information, and it turned out to be a weapon for marketing information to promote political aims. It served that purpose in promoting President Carter policy to stop reprocessing of spent fuel. (author)

  10. Secrecy and misguided policy

    International Nuclear Information System (INIS)

    Rossin, A.D.

    2001-01-01

    The atomic bomb was born in secrecy. After the war, scientists and statesmen committed themselves to develop the promise of nuclear energy without the proliferation of nuclear weapons. The most obvious tool available to them was secrecy. But secrecy was not the sword that could easily be beaten into the plowshare. It proved to be a double-edged sword. It could not stop the spread of basic scientific information, and it turned out to be a weapon for marketing information to promote political aims. It served that purpose in promoting President Carter policy to stop reprocessing of spent fuel. (author)

  11. Multipartite classical and quantum secrecy monotones

    International Nuclear Information System (INIS)

    Cerf, N.J.; Massar, S.; Schneider, S.

    2002-01-01

    In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or public classical communication. These 'secrecy monotones' therefore measure how much secret correlation is shared by the parties. In the bipartite case we show that the mutual information is a secrecy monotone. In the multipartite case we describe two different generalizations of the mutual information, both of which are secrecy monotones. The existence of two distinct secrecy monotones allows us to show that in multipartite quantum cryptography the parties must make irreversible choices about which multipartite correlations they want to obtain. Secrecy monotones can be extended to the quantum domain and are then defined on density matrices. We illustrate this generalization by considering tripartite quantum cryptography based on the Greenberger-Horne-Zeilinger state. We show that before carrying out measurements on the state, the parties must make an irreversible decision about what probability distribution they want to obtain

  12. [Healthcare Provider Professional Secrecy: an Issue for Public Health Democracy somewhere between Immanence and Alienation.

    Science.gov (United States)

    Pautier, Silvère

    2017-09-01

    For a long time considered as total and absolute, healthcare professional secrecy is today difficult to reconcile with care practices. Lots of paradoxes question its preservation in favour of general interest and public order against the protection of private interest within an individualistic normative society. Exploring this interrogation, the article's objective is to initiate an ethical discussion from a professional caregiver secrecy's historical and sociological evolution perspective. Thus, with the help of theoretical understandings, especially those by Michel Foucault, medical secrecy is considered a defense of rationality specific to populations' government. This conceptualization finds arguments through social collective norms attached to an alienating biopower at the expense of secrecy integrated as an individualistic and immanent social norm. However, beyond the well-known debate on the absolute necessity for change, evolution… the distance from the Socratic and Hippocratic principles engage people and society in real democratic decisions about Health. Also, health professionals, patients, usgers and society must consider the limits that would lead to medical confidentiality.

  13. Mental illness stigma, secrecy and suicidal ideation.

    Science.gov (United States)

    Oexle, N; Ajdacic-Gross, V; Kilian, R; Müller, M; Rodgers, S; Xu, Z; Rössler, W; Rüsch, N

    2017-02-01

    Whether the public stigma associated with mental illness negatively affects an individual, largely depends on whether the person has been labelled 'mentally ill'. For labelled individuals concealing mental illness is a common strategy to cope with mental illness stigma, despite secrecy's potential negative consequences. In addition, initial evidence points to a link between stigma and suicidality, but quantitative data from community samples are lacking. Based on previous literature about mental illness stigma and suicidality, as well as about the potential influence of labelling processes and secrecy, a theory-driven model linking perceived mental illness stigma and suicidal ideation by a mediation of secrecy and hopelessness was established. This model was tested separately among labelled and unlabelled persons using data derived from a Swiss cross-sectional population-based study. A large community sample of people with elevated psychiatric symptoms was examined by interviews and self-report, collecting information on perceived stigma, secrecy, hopelessness and suicidal ideation. Participants who had ever used mental health services were considered as labelled 'mentally ill'. A descriptive analysis, stratified logistic regression models and a path analysis testing a three-path mediation effect were conducted. While no significant differences between labelled and unlabelled participants were observed regarding perceived stigma and secrecy, labelled individuals reported significantly higher frequencies of suicidal ideation and feelings of hopelessness. More perceived stigma was associated with suicidal ideation among labelled, but not among unlabelled individuals. In the path analysis, this link was mediated by increased secrecy and hopelessness. Results from this study indicate that among persons labelled 'mentally ill', mental illness stigma is a contributor to suicidal ideation. One explanation for this association is the relation perceived stigma has with

  14. Robust Secure Authentication and Data Storage with Perfect Secrecy

    Directory of Open Access Journals (Sweden)

    Sebastian Baur

    2018-04-01

    Full Text Available We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF, respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key generated for authentication, these definitions differ in their requirements. In the first work on PUF based authentication, weak secrecy has been used and the corresponding capacity regions have been characterized. The disadvantages of weak secrecy are well known. The ultimate performance criteria for the key are perfect secrecy together with uniform distribution of the key. We derive the corresponding capacity region. We show that, for perfect secrecy and uniform distribution of the key, we can achieve the same rates as for weak secrecy together with a weaker requirement on the distribution of the key. In the classical works on PUF based authentication, it is assumed that the source statistics are known perfectly. This requirement is rarely met in applications. That is why the model is generalized to a compound model, taking into account source uncertainty. We also derive the capacity region for the compound model requiring perfect secrecy. Additionally, we consider results for secure storage using a biometric or PUF source that follow directly from the results for authentication. We also generalize known results for this problem by weakening the assumption concerning the distribution of the data that shall be stored. This allows us to combine source compression and secure storage.

  15. Secrecy From Parents and Type 1 Diabetes Management in Late Adolescence.

    Science.gov (United States)

    Main, Alexandra; Wiebe, Deborah J; Van Bogart, Karina; Turner, Sara L; Tucker, Christy; Butner, Jonathan E; Berg, Cynthia A

    2015-01-01

    This study examined (a) associations of parent-adolescent relationship characteristics and adolescent problem behavior with late adolescents' secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. Adolescents (N = 247, Mage = 17.76 years) completed survey measures of diabetes-related secrecy from parents, disclosure, parental acceptance, parental knowledge, and conduct problems. Mothers and adolescents reported on adolescent adherence to diabetes regimens and adolescents reported their depressive symptoms. Glycemic control was obtained from HbA1c test kits. Adolescent-reported disclosure to parents was uniquely negatively associated with secrecy from parents. Controlling for relationship variables, conduct problems, and sociodemographic and illness-related variables, secrecy from mothers was uniquely associated with poorer glycemic control and secrecy from both parents was associated with lower adherence. Secrecy about type 1 diabetes management is uniquely associated with diabetes outcomes independent of other relationship characteristics and problem behaviors. © The Author 2015. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Blueprints for Disaster: Balancing Secrecy and Transparency of Government Continuity Plans

    Science.gov (United States)

    2016-09-01

    ISO/IEC 31010:2009; COSO 2004; and OCEG “Red Book” 2.0: 2009. Institute of Risk Management , “ Risk Management Standards,” accessed June 26, 2015...Information Act (FOIA), protective security, risk management , Presidential Policy Directive 21 (PPD-21), National Security Presidential Directive 51 (NSPD...BLUEPRINTS FOR DISASTER: BALANCING SECRECY AND TRANSPARENCY OF GOVERNMENT CONTINUITY PLANS Stephen Scott Vollbrecht State Risk Manager for

  17. On the Secrecy Capacity of MISO Visible Light Communication Channels

    KAUST Repository

    Arfaoui, Mohamed Amine

    2017-02-07

    We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically, we compute the achievable secrecy rate for various input signaling distributions, including the truncated generalized normal (TGN) and uniform distributions. The transmitter is equipped with multiple light sources, while the legitimate and unauthorized receivers are each equipped with a single photodetector. We analyze the achievable secrecy rates via transmit beamforming and artificial noise. In addition, both zero-forcing beamforming and robust beamforming are considered. In the former case, the location of the eavesdropper is assumed to be known, whereas in the latter case, the location of the eavesdropper is unknown. Our numerical results show that the secrecy rate achieved by the TGN distribution is significantly improved as compared to those achieved by the truncated Gaussian and uniform distributions, for both zero-forcing beamforming and robust beamforming. We also derive an upper bound on the achievable secrecy capacity that we used to assess the closeness of the achievable secrecy rates to the derived bound.

  18. Atomic secrecy

    International Nuclear Information System (INIS)

    Sweet, W.

    1979-01-01

    An article, The H-Bomb Secret: How We Got It, Why We're Telling It, by Howard Morland was to be published in The Progressive magazine in February, 1979. The government, after learning of the author's and the editors' intention to publish the article and failing to persuade them to voluntarily delete about 20% of the text and all of the diagrams showing how an H-bomb works, requested a court injunction against publication. Acting under the Atomic Energy Act of 1954, US District Court Judge Robert W. Warren granted the government's request on March 26. Events dealing with the case are discussed in this publication. Section 1, Progressive Hydrogen Bomb Case, is discussed under the following: Court Order Blocking Magazine Report; Origins of the Howard Morland Article; Author's Motives, Defense of Publication; and Government Arguments Against Disclosure. Section 2, Access to Atomic Data Since 1939, contains information on need for secrecy during World War II; 1946 Atomic Energy Act and its effects; Soviet A-Bomb and the US H-Bomb; and consequences of 1954 Atomic Energy Act. Section 3, Disputed Need for Atomic Secrecy, contains papers entitled: Lack of Studies on H-Bomb Proliferation; Administration's Position on H-Bombs; and National Security Needs vs Free Press

  19. On Secrecy Performance of Mixed RF-FSO Systems

    KAUST Repository

    Lei, Hongjiang; Dai, Zhijun; Ansari, Imran Shafique; Park, Kihong; pan, Gaofeng; Alouini, Mohamed-Slim

    2017-01-01

    In this work, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and the FSO link experiences the Gamma-Gamma fading. The effect of pointing error and two types of detection techniques (i.e., heterodyne detection and intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound of the secrecy outage probability (SOP) and exact average secrecy capacity (ASC). Furthermore, by utilizing the expansion of Meijer's G-function, asymptotic results for SOP and ASC are derived when the electrical signal-to-noise ratio of the FSO link tends to infinity. Numerical and Monte-Carlo simulation results are provided to verify the accuracy of our proposed results.

  20. On Secrecy Performance of Mixed RF-FSO Systems

    KAUST Repository

    Lei, Hongjiang

    2017-07-05

    In this work, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and the FSO link experiences the Gamma-Gamma fading. The effect of pointing error and two types of detection techniques (i.e., heterodyne detection and intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound of the secrecy outage probability (SOP) and exact average secrecy capacity (ASC). Furthermore, by utilizing the expansion of Meijer\\'s G-function, asymptotic results for SOP and ASC are derived when the electrical signal-to-noise ratio of the FSO link tends to infinity. Numerical and Monte-Carlo simulation results are provided to verify the accuracy of our proposed results.

  1. Secrecy and Democracy: The Conflict between American Ideals and American Institutions

    Science.gov (United States)

    2014-05-22

    secrecy begins1 — Hannah Arendt , The Burden of our Time) INTRODUCTION The United States was born in secrecy. In 1787, the Constitutional Convention...Application Programming Interfaces.” American Behavioral Scientist 57, no. 5 (December 2012): 623-642. DOI:10.1177/000276421269363. Arendt , Hannah . The...secrecy and transparency, privacy and publicity, that undermines 1Hannah Arendt , The Burden of our Time (London: Secker and Warburg, 1951), 386

  2. Keeping secrets from parents: Longitudinal associations of secrecy in adolescence

    NARCIS (Netherlands)

    Frijns, T.; Finkenauer, C.; Vermulst, A.A.; Engels, R.C.M.E.

    2005-01-01

    A 2-wave survey study among 1173 10-14-year-olds tested the longitudinal contribution of secrecy from parents to psychosocial and behavioral problems in adolescence. Additionally, it investigated a hypothesized contribution of secrecy from parents to adolescent development by examining its relation

  3. Circular from January 26, 2004, taken for the enforcement of the by-law from January 26, 2004, relative to the national defense secrecy protection in the domain of nuclear materials protection and control; Circulaire du 26 janvier 2004 prise pour l'application de l'arrete du 26 janvier 2004 relatif a la protection du secret de la defense nationale dans le domaine de la protection et du controle des matieres nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-15

    The by-law of January 26, 2004 gives a regulatory foundation to the classification of sensible informations relative to the security and physical protection of nuclear materials. This circular recalls, in this framework, the conditions of implementation of the regulation relative to the protection of national defense secrecies in the domain of the protection of nuclear facilities and materials. (J.S.)

  4. Disclosure of Professional Secrecy – A Criminal Law Analysis and Dilemmas (Dileme kaznivega dejanja neupravičene izdaje poklicne skrivnosti

    Directory of Open Access Journals (Sweden)

    Miha Šepec

    2017-12-01

    Full Text Available Disclosure of professional secrecy is incriminated in Article 142 of the Slovenian Penal Code (KZ-1. The offence protects the privacy of individuals in order to protect them from abuse when personal information and secrets are communicated to persons of certain professions (doctors, lawyers, priests, etc.. The issue is analyzed briefly; however, the context raises extremely complex dogmatic issues, particularly in the direction when unlawfulness of the crime shall be excluded, whether it is reasonable that such a complex offence is not prosecuted ex officio or upon request by the injured person, and the nature of relationship between the offence of disclosure of professional secrecy according to Article 142 and offences under Articles 280 (Failure to Inform Authorities of Preparations for Crime and 281 (Failure to Provide Information of Crime or Perpetrator of the Slovenian Penal Code. The aim of this paper is to highlight some legal dogmatic issues that have not yet been discussed in legal practice. On the other hand, the authors would also like to urge the legislature to amend the current criminal offence of disclosure of professional secrecy.

  5. A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

    Directory of Open Access Journals (Sweden)

    Fabio Ciabini

    2016-10-01

    Full Text Available Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption.

  6. Improved achievable secrecy rate of visible light communication with cooperative jamming

    KAUST Repository

    Zaid, Hajar; Rezki, Zouheir; Chaaban, Anas; Alouini, Mohamed-Slim

    2016-01-01

    constraint on the input distribution which renders Gaussian inputs not admissible. We provide an achievable secrecy rate that improves upon a recently established one in a concurrent work by Mostafa and Lampe. Our scheme follows from both the secrecy capacity

  7. Improved achievable secrecy rate of visible light communication with cooperative jamming

    KAUST Repository

    Zaid, Hajar

    2016-02-25

    In this paper we study the problem of securing a visible light communication (VLC) link against passive eavesdropping, with the help of a (friendly) jammer. Differently from radio frequency (RF) communications, VLC imposes a peak amplitude constraint on the input distribution which renders Gaussian inputs not admissible. We provide an achievable secrecy rate that improves upon a recently established one in a concurrent work by Mostafa and Lampe. Our scheme follows from both the secrecy capacity result by Wyner and the artificial noise scheme by Goel and Negi, but using truncated Gaussian input distributions instead of uniform ones. Via numerical results, we show that our secrecy rate outperforms the concurrent rate in different settings. © 2015 IEEE.

  8. Secrecy extraction from no-signaling correlations

    International Nuclear Information System (INIS)

    Scarani, Valerio; Gisin, Nicolas; Brunner, Nicolas; Masanes, Lluis; Pino, Sergi; Acin, Antonio

    2006-01-01

    Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual security proofs suppose that the authorized partners, Alice and Bob, have a perfect knowledge and control of their quantum systems and devices; for instance, they must be sure that the logical bits have been encoded in true qubits and not in higher dimensional systems. In this paper, we present an approach that circumvents this strong assumption. We define protocols, both for the case of bits and for generic d-dimensional outcomes, in which the security is guaranteed by the very structure of the Alice-Bob correlations, under the no-signaling condition. The idea is that if the correlations cannot be produced by shared randomness, then Eve has poor knowledge of Alice's and Bob's symbols. The present study assumes on the one hand that the eavesdropper Eve performs only individual attacks (this is a limitation to be removed in further work), and on the other hand that Eve can distribute any correlation compatible with the no-signaling condition (in this sense her power is greater than what quantum physics allows). Under these assumptions, we prove that the protocols defined here allow extracting secrecy from noisy correlations, when these correlations violate a Bell-type inequality by a sufficiently large amount. The region in which secrecy extraction is possible extends within the region of correlations achievable by measurements on entangled quantum states

  9. Silence and Memories of War: An Autoethnographic Exploration of Family Secrecy.

    Science.gov (United States)

    Rober, Peter; Rosenblatt, Paul C

    2017-03-01

    A personal journey and a scientific challenge, this is an autoethnographic study about my own family's secrecy. I knew my grandfather had been a German prisoner of war during World War II. We all knew. But nobody talked about it. Then one day I decided I wanted to do systematic research on the issue of family secrecy around my grandfather's war experiences. Researching one's own family can be called autoethnography. It could be said that autoethnography is an approach to research that aims to describe and systemically analyze (graphy) personal experience (auto) to understand social and cultural phenomena (ethno). This scientific approach is quite new in the field of family therapy. This study has been an important personal quest, but it also led to important reflections on silences in families, on my own professional development, and on methodological issues concerning autoethnographical research. For one thing, it highlights some of the positive aspects of family secrecy and silences, and invites us-when confronted with family secrecy in clinical practice-to carefully consider the potential destructive and life-giving aspects of the silence. © 2015 Family Process Institute.

  10. The semantics of secrecy: young children's classification of secret content.

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J

    2010-01-01

    The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.

  11. Secrecy Capacity Analysis over α−μ Fading Channels

    KAUST Repository

    Lei, Hongjiang

    2017-02-15

    In this work, we study the secrecy capacity of the classic Wyner’s model over the α − μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of Θ(ln p), where p stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small α) and sparse clustering (small μ) will lead to the improvement of ASC.

  12. Secrecy Capacity Analysis over α−μ Fading Channels

    KAUST Repository

    Lei, Hongjiang; Ansari, Imran Shafique; Pan, Gaofeng; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    In this work, we study the secrecy capacity of the classic Wyner’s model over the α − μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of Θ(ln p), where p stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small α) and sparse clustering (small μ) will lead to the improvement of ASC.

  13. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  14. On the secrecy capacity of the wiretap channel with imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir

    2014-10-01

    We study the secrecy capacity of fast fading channels under imperfect main channel (between the transmitter and the legitimate receiver) estimation at the transmitter. Lower and upper bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate follows from a standard wiretap code in which a simple on-off power control is employed along with a Gaussian input. The upper bound is obtained using an appropriate correlation scheme of the main and eavesdropper channels and is the best known upper bound so far. The upper and lower bounds coincide with recently derived ones in case of perfect main CSI. Furthermore, the upper bound is tight in case of no main CSI, where the secrecy capacity is equal to zero. Asymptotic analysis at high and low signal-to-noise ratio (SNR) is also given. At high SNR, we show that the capacity is bounded by providing upper and lower bounds that depend on the channel estimation error. At low SNR, however, we prove that the secrecy capacity is asymptotically equal to the capacity of the main channel as if there were no secrecy constraint. Numerical results are provided for i.i.d. Rayleigh fading channels.

  15. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir

    2011-11-01

    The ergodic secrecy capacity of the wiretap channel is known when the main channel (between the transmitter and the legitimate receiver) state information (CSI) is perfect at the transmitter and the coherence period is sufficiently large to enable random coding arguments in each block. In a fast fading scenario, when the codeword length spans many coherence periods, the secrecy capacity is still not known. In this paper, we present a framework that characterizes this secrecy capacity under imperfect main channel estimation at the transmitter. Inner and outer bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate is a simple on-off scheme using a Gaussian input. The upper bound is obtained using an appropriate correlation scheme of the main and the eavesdropper channels. The upper and the lower bounds coincide with recently derived ones in the perfect main CSI extreme. Furthermore, the lower bound matches the upper bound in no main CSI extreme, where the secrecy capacity is equal to zero. Numerical results are provided for independent identically distributed (i.i.d.) Rayleigh fading channels. © 2011 IEEE.

  16. RFID Ownership Transfer with Positive Secrecy Capacity Channels

    Directory of Open Access Journals (Sweden)

    Jorge Munilla

    2016-12-01

    Full Text Available RFID ownership transfer protocols (OTPs transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i is formally secure in the proposed communication model and (ii achieves privacy with a noisy tag wiretap channel without TTPs.

  17. Children's Disclosure and Secrecy: Links to Maternal Parenting Characteristics and Children's Coping Skills

    Science.gov (United States)

    Almas, Alisa N.; Grusec, Joan E.; Tackett, Jennifer L.

    2011-01-01

    The relations between maternal parenting characteristics, child disclosure and secrecy, and child outcomes (positive and negative strategies for coping with distress), were examined in a study of 140 children (10-12-year-olds) and their mothers. Child disclosure and secrecy were shown to be distinct but related constructs with authoritativeness…

  18. House of shame [nuclear secrecy

    International Nuclear Information System (INIS)

    Smith, Llew.

    1994-01-01

    The nuclear debate in the United Kingdom has been and continues to be shrouded in secrecy. Despite numerous Parliamentary questions, the author, a Member of Parliament and a former Member of the European Parliament, recounts his personal experience in failing to obtain details of nuclear matters. Reasons for keeping nuclear information secret range from claims that revealing it would endanger national security to the disproportionate cost of information exposure. (UK)

  19. New public management and policies of secrecy

    Directory of Open Access Journals (Sweden)

    Lise DEMAILLY

    2013-12-01

    Full Text Available Crossing a survey of literature in sociology of health and her own inquiries in the field of mental health, the author studies the historical change in policies of secrecy in health domains and specifically, in modern democracies, practical aporias opposing rights and duties to and towards secrecy, rights and duty to and towards transparency. The paper describes weakening of medical secret regarding legitimization of standards of transparency, coordination and evaluation supported by the New Public Management (NPM. Two forms of resistance against technocratic enforcement to publicizing are suggested. The first of these forms is the historical exception, nowadays vilified as out of date, of psychoanalysis bound to strict secret of the singular interview and building there a space for emancipation, preventing any governance of behavior by healthiness. The second one: some intentional and paradoxical break of secret can result in symbolic reversal against domination and shame.

  20. 75 FR 79440 - Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of...

    Science.gov (United States)

    2010-12-20

    ... DEPARTMENT OF THE TREASURY Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of Application for Membership AGENCY: Financial Crimes Enforcement Network, Department of the... financial institutions and trade groups for membership on the Bank Secrecy Act Advisory Group. New members...

  1. [Legal secrecy: abortion in Puerto Rico from 1937 to 1970].

    Science.gov (United States)

    Marchand-Arias, R E

    1998-03-01

    The essay discusses abortion in Puerto Rico from 1937 to 1970, concentrating in its legal status as well as its social practice. The research documents the contradictions between the legality of the procedure and a social practice characterized by secrecy. The essay discusses the role of the Clergy Consultation Service on Abortion in promoting the legal practice of absortion in Puerto Rico. It also discusses the ambivalent role of medical doctors who, despite being legally authorized to perform abortions to protect the life and health of women, refused to perform the procedure arguing abortion was illegal. The essay concludes with a brief discussion on perceptions of illegality regarding abortion, emphasizing the contradictions between the practice of abortion and that of sterilization in Puerto Rico.

  2. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Ansari, Imran Shafique; Pan, Gaofeng; Alouini, Mohamed-Slim

    2017-01-01

    This study investigates the secrecy outage performance of a single-input multiple-output underlay cognitive radio network (CRN) with outdated channel state information (CSI). The confidential messages are transmitted from transmitter to the destination, while a multi-antenna eavesdropper exists. The maximal ratio combining and selection combining schemes are utilised at the receivers to improve the quality of the received signal-to-noise ratio. The exact and asymptotic closed-form expressions of secrecy outage probability are derived, and simulation results are provided to verify the authors' proposed analytical results. The results reveal that imperfect CSI of main channels deteriorates the secrecy outage performance while that of eavesdropping and interfering channels has contrary effect, and only a unity diversity order can be obtained in underlay CRNs with imperfect CSI.

  3. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI

    KAUST Repository

    Lei, Hongjiang

    2017-06-13

    This study investigates the secrecy outage performance of a single-input multiple-output underlay cognitive radio network (CRN) with outdated channel state information (CSI). The confidential messages are transmitted from transmitter to the destination, while a multi-antenna eavesdropper exists. The maximal ratio combining and selection combining schemes are utilised at the receivers to improve the quality of the received signal-to-noise ratio. The exact and asymptotic closed-form expressions of secrecy outage probability are derived, and simulation results are provided to verify the authors\\' proposed analytical results. The results reveal that imperfect CSI of main channels deteriorates the secrecy outage performance while that of eavesdropping and interfering channels has contrary effect, and only a unity diversity order can be obtained in underlay CRNs with imperfect CSI.

  4. On the Secrecy Capacity Region of the Block-Fading BCC with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal

    2017-02-07

    In this work, we examine the secrecy capacity region of the block-fading broadcast channel with confidential messages (BCC) when the transmitter has limited knowledge of the channel. In particular, we consider a two-user communication system where the transmitter has one common message to be transmitted to both users and one confidential message intended to only one of them. The confidential message has to be kept secret from the other user to whom the information is not intended. The transmitter is not aware of the channel state information (CSI) of neither channel and is only provided by limited CSI feedback sent at the beginning of each fading block. Assuming an error-free feedback link, we characterize the secrecy capacity region of this channel and show that even with a 1-bit CSI feedback, a positive secrecy rate can still be achieved. Then, we look at the case where the feedback link is not error- free and is rather a binary erasure channel (BEC). In the latter case, we provide an achievable secrecy rate region and show that as long as the erasure event is not a probability 1 event, the transmitter can still transmit the confidential information with a positive secrecy rate.

  5. Glasnost and Secrecy in the Soviet Military

    Science.gov (United States)

    1990-12-21

    the most vicious and xenophobic brand of Russian chauvinism, complete with witch-hunts and spymania. Secrecy was also important for enhancing the...the Soviet Armed Forces, a significant factor tor a military establishment historically used to ’ie position of the underdog because of the Soviet

  6. Is it bad to have secrets? Cognitive preoccupation as a toxic element of secrecy

    NARCIS (Netherlands)

    Maas, J.; Wismeijer, A.A.J.; Assen, M.A.L.M. van; Aquarius, A.E.A.M.

    2012-01-01

    This ex post facto study examined the effect of secrecy on well-being in a sample of 287 HIV-positive individuals, using both self-report data and objective immune parameters. The effects on well-being of three components of secrecy were studied; self-concealment, possession of a secret, and

  7. Joint Secrecy for D2D Communications Underlying Cellular Networks

    KAUST Repository

    Hyadi, Amal

    2018-01-15

    In this work, we investigate the ergodic secrecy rate region of a block-fading spectrum-sharing system, where a D2D communication is underlying a cellular channel. We consider that both the primary and the secondary transmissions require their respective transmitted messages to be kept secret from a common eavesdropper under a joint secrecy constraint. The presented results are for three different scenarios, each corresponding to a particular requirement of the cellular system. First, we consider the case of a fair cellular system, and we show that the impact of jointly securing the transmissions can be balanced between the primary and the secondary systems. The second scenario examines the case when the primary network is demanding and requires the secondary transmission to be at a rate that is decodable by the primary receiver, while the last scenario assumes a joint transmission of artificial noise by the primary and the secondary transmitters. For each scenario, we present an achievable ergodic secrecy rate region that can be used as an indicator for the cellular and the D2D systems to agree under which terms the spectrum will be shared.

  8. Keeping Government Secrecy Safe: Beyond Whack-a-Mole

    NARCIS (Netherlands)

    Curtin, D.M.

    2011-01-01

    The concept of secrecy as a mechanism for not providing government information, on the one hand, and the commitment to openness of government, on the other, reflect certain historical understandings of the relationship between a government, citizens, officials and information. Within democratic

  9. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang

    2018-04-09

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  10. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Zhang, Zufan; Pan, Gaofeng; Alouini, Mohamed-Slim

    2018-01-01

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  11. 78 FR 23916 - Secrecy and License To Export

    Science.gov (United States)

    2013-04-23

    ... DEPARTMENT OF COMMERCE Patent and Trademark Office Secrecy and License To Export ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office (USPTO), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public and other Federal...

  12. Recurring tensions between secrecy and democracy : Arguments on the Security Service in Dutch parliament, 1975-1995

    NARCIS (Netherlands)

    Braat, E.C.

    2016-01-01

    There is a recurring tension between secrecy and democracy. This article analyzes the continually ambiguous relations between intelligence and security agencies and their parliamentary principals. I present a novel conceptual framework to analyze political relations influenced by secrecy. I draw on

  13. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  14. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  15. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels

    Directory of Open Access Journals (Sweden)

    Aggarwal Vaneet

    2009-01-01

    Full Text Available The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for the Gaussian model using recent capacity results for a Gaussian multiantenna point-to-point channel with a multiantenna eavesdropper. The outer bounds are shown to be tight for two subclasses of channels. The first subclass is one in which the source and relay are clustered, and the eavesdropper receives signals only on the channel from the source and the relay to the destination, for which the PDF strategy is optimal. The second is a subclass in which the source does not transmit to the relay, for which a noise-forwarding strategy is optimal.

  16. The End of Bank Secrecy?

    DEFF Research Database (Denmark)

    Johannesen, Niels; Zucman, Gabriel

    2014-01-01

    the treaties affected bank deposits in tax havens. Rather than repatriating funds, our results suggest that tax evaders shifted deposits to havens not covered by a treaty with their home country. The crackdown thus caused a relocation of deposits at the benefit of the least compliant havens. We discuss......During the financial crisis, G20 countries compelled tax havens to sign bilateral treaties providing for exchange of bank information. Policymakers have celebrated this global initiative as the end of bank secrecy. Exploiting a unique panel dataset, our study is the first attempt to assess how...

  17. Estudios de secreción de IL-12 en macrófagos J774A.1

    OpenAIRE

    Rojas Rojas, Angela Patricia

    2012-01-01

    El tráfico de membranas en macrófagos activados es requerido para dos eventos críticos en la inmunidad innata, como son fagocitosis y secreción de citoquinas proinflamatorias. Sin embargo, no existe evidencia significativa a cerca de las rutas de secreción en macrófagos, excepto para IL-1 β (Andrei et al., 2004) y TNF-a, en infección por Cándida albicans (Murray et al., 2005) y Leishmania amazonensis (Montoya, 2010), a diferencia de la secreción en células endocrinas y neuroendocrinas d...

  18. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  19. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  20. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal

    2016-10-27

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  1. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  2. On the Secrecy Degrees of Freedom with Full-Duplex Communication

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Mogensen, Preben Elgaard

    2017-01-01

    of such an application. The potential of full duplex nodes in improving the physical layer security of a communication link is investigated in this contribution. We specifically derive the information theoretic secrecy degrees of freedom measure for a pair of nodes communicating in full duplex mode. Moreover, closed...... and the delay reduction of full duplex communication are somewhat limited in realistic network settings, leading researchers to study other possible applications of full duplex communication which can provide significantly higher gains over half duplex communication. Physical layer security is an example...... form expressions for the instantaneous and ergodic throughput gain of full duplex communication over conventional half duplex is derived. The secrecy degrees of freedom with full duplex is shown to be two as opposed to that of zero in half duplex mode....

  3. On the Secrecy Capacity of MISO Visible Light Communication Channels

    KAUST Repository

    Arfaoui, Mohamed Amine; Rezki, Zouheir; Ghrayeb, Ali; Alouini, Mohamed-Slim

    2017-01-01

    We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically

  4. On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the ergodic secrecy capacity of a block fading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error free public link with limited capacity. Assuming an average transmit power constraint, we provide an upper and a lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large; hence, fully characterizing the secrecy capacity in this case.

  5. On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal

    2015-12-01

    We study the ergodic secrecy capacity of a block fading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error free public link with limited capacity. Assuming an average transmit power constraint, we provide an upper and a lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large; hence, fully characterizing the secrecy capacity in this case.

  6. A critical examination of factors that might encourage secrecy

    Science.gov (United States)

    Tough, Allen

    If a signal is detected someday from extraterrestrial intelligence, several factors might encourage complete and immediate secrecy. As a result, all data might be restricted to the receiving facility or nation instead of being shared promptly with SETI scientists around the world. Seven factors seem particularly like to encourage secrecy: (1) the belief that people may panic; (2) the fear of a negative impact on religion, science, and culture; (3) embarrassment; (4) the individual and national competitive urge; (5) avoiding a harmful premature reply; (6) a national trade or military advantage; and (7) the fear of a Trojan Horse. Three steps might alleviate the particularly difficult factors (numbers 4, 5, 6): an international treaty for immediate sharing of possible signals with SETI scientists in several other countries; implementation and frequent use of an actual network of scientists for such sharing; and further study of the possible need for partial restriction of data about the location and channel of a suspected signal.

  7. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  8. Secrecy in Educational Practices: Enacting Nested Black Boxes in Cheating and Deception Detection Systems

    Directory of Open Access Journals (Sweden)

    Jo An Oravec

    2018-02-01

    Full Text Available This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations. Many of these systems are developed and implemented by third-party corporate entities who claim practices to be proprietary and secret. The outsourcers involved in these efforts have provided one level of secrecy and educational administrators involved yet another level, thus constructing "nested black boxes." Also discussed in this paper is the “paranoid style” of administration, often supported by the surveillance and construction of rosters of potential non-conformists, such as alleged cheaters and speech code violators. The educational technologies described in this article are increasingly applied to workplace practices, with young people being trained in what is deemed acceptable conduct. Secrecy can serve to alter the character of relationships within the educational institutions involved as well as inside the workplaces in which the approaches are increasingly being integrated.

  9. 75 FR 19463 - Procedures for Monitoring Bank Secrecy Act Compliance

    Science.gov (United States)

    2010-04-14

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Procedures for Monitoring Bank Secrecy Act Compliance AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and request for comment...; and Information Collection Comments, Chief Counsel's Office, Office of Thrift Supervision, 1700 G...

  10. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang; Zhang, Huan; Ansari, Imran Shafique; Ren, Zhi; Pan, Gaofeng; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  11. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang

    2017-10-02

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  12. Secrecy as embodied practice: beyond the confessional imperative.

    Science.gov (United States)

    Hardon, Anita; Posel, Deborah

    2012-01-01

    This introduction to this special issue of Culture, Health & Sexuality aims to intervene critically in debates in public health about sexual rights and ways of de-stigmatising HIV/AIDS, in which silence and secrets are seen to undermine well-being and perpetuate stigma. It presents key insights from collaborative studies on HIV/AIDS and youth sexual health, arguing that advocates of disclosure and sexual rights need to think more contextually and tactically in promoting truth-telling. The authors aim to enhance current thinking on secrecy, which examines it primarily as a social practice, by emphasising the centrality of the body and the experience of embodiment in the making and unmaking of secrets. To understand secrecy as embodied practice requires understanding how it simultaneously involves the body as subject - as the basis from which we experience the world - and the body as object - that can be actively manipulated, silenced and 'done'. The authors show how tensions emerge when bodies reveal reproductive mishaps and describe how the dissonances are resolved through a variety of silencing practices. The paper ends by discussing the implications of these insights for sexual-health programmes.

  13. ETHIC AND SECRECY ON THE CORPORATE ENVIRONMENT AND THE SECRETARIAT PROFESSIONALS

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Whitaker

    2010-09-01

    Full Text Available This paper, based on theoretical and field research, aims at showing the importance of preserving confidentiality on a daily basis in the context of an "ethical company”. It reports how this practice besides solidifying the image of the organization can also guarantee the existence of a high level of trust and respect between the participants emphasizing the importance of secretarial professionals in that mission. Besides being a regulated profession, which has a code of ethics with explicit determinations about the importance of confidentiality, secrecy is one of the attributes required for the job. The secretaries are aware and convinced of the necessity of secrecy not only in the exercise of their profession, but in their private lives, considering that private interests should not outweigh the public interest.

  14. Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

    Directory of Open Access Journals (Sweden)

    Pin-Hsun Lin

    2015-08-01

    Full Text Available In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN and cooperative jamming with and without clean relaying (CR. We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters, i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.

  15. Performance Analysis of Secrecy Outage Probability for AF-Based Partial Relay Selection with Outdated Channel Estimates

    Directory of Open Access Journals (Sweden)

    Kyu-Sung Hwang

    2017-01-01

    Full Text Available We study the secrecy outage probability of the amplify-and-forward (AF relaying protocol, which consists of one source, one destination, multiple relays, and multiple eavesdroppers. In this system, the aim is to transmit the confidential messages from a source to a destination via the selected relay in presence of eavesdroppers. Moreover, partial relay selection scheme is utilized for relay selection based on outdated channel state information where only neighboring channel information (source-relays is available and passive eavesdroppers are considered where a transmitter does not have any knowledge of eavesdroppers’ channels. Specifically, we offer the exact secrecy outage probability of the proposed system in a one-integral form as well as providing the asymptotic secrecy outage probability in a closed-form. Numerical examples are given to verify our provided analytical results for different system conditions.

  16. Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Byung Wook Kim

    2017-01-01

    Full Text Available Recently, mobile cloud computing (MCC has gained a lot of interest for researchers building the next-generation mobile applications. Because unauthorized access may cause serious problems, security and privacy with MCC have become significant issues. This paper addresses the secrecy dimming capacity of secure transmission in MCC over visible light communication (VLC channels. By obtaining the entropy-maximizing symbol probability of multiple light emitting diode- (LED- based pulse amplitude modulation (PAM, mathematical analysis of the secrecy dimming capacity of VLC was derived. Simulation results show that the secure transmission ability of multi-LED-based VLC is determined according to the number of activated LEDs and target dimming level. This can be a guideline for practical VLC-based mobile network designers intending to secure wireless transmission and to decide on the number of activated LEDs at target dimming level to operate.

  17. A Sketch of Modern Cryptology - The Art and Science of Secrecy

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 5; Issue 9. A Sketch of Modern Cryptology - The Art and Science of Secrecy Systems. Palash Sarkar. General Article Volume 5 Issue 9 September 2000 pp 22-40. Fulltext. Click here to view fulltext PDF. Permanent link:

  18. Statistical secrecy and multibit commitments

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Torben P.; Pfitzmann, Birgit

    1998-01-01

    nothing about it. One definition is based on the L1-norm distance between probability distributions, the other on information theory. We prove that the two definitions are essentially equivalent. We also show that statistical counterparts of definitions of computational secrecy are essentially equivalent......We present and compare definitions of "statistically hiding" protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost...... to our main definitions. Commitment schemes are an important cryptologic primitive. Their purpose is to commit one party to a certain value, while hiding this value from the other party until some later time. We present a statistically hiding commitment scheme allowing commitment to many bits...

  19. Keeping secrets from friends: Exploring the effects of friendship quality, loneliness and self-esteem on secrecy.

    Science.gov (United States)

    Corsano, Paola; Musetti, Alessandro; Caricati, Luca; Magnani, Barbara

    2017-07-01

    The tendency to keep secrets in adolescents has been studied in particular in their relationships with their parents and associated with psychosocial disadvantages. The current study focused on peer relationships and investigated the effects of friendship quality, loneliness in a multidimensional perspective, and self-esteem on secrecy from friends. Italian adolescents (N = 457; 47% male; 100% white) aged between 13 and 19 years (M = 16.11; SD = 1.53) reported their secrecy from friends, peer and parent-related loneliness, aversion and affinity for aloneness, their self-esteem and the quality of their relationships with their friends. The results showed that peer-related loneliness, affinity for aloneness and self-esteem in particular affect keeping secrets from friends, independent of the participant's gender. Moreover, peer-related loneliness and affinity for aloneness mediated the relationship between self-esteem and secrecy. The data were discussed in the light of adolescence developmental tasks. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  20. 76 FR 18365 - Fair Credit Reporting Act and Bank Secrecy Act Compliance

    Science.gov (United States)

    2011-04-04

    ... Procedure Act (APA), an agency may, for good cause, find (and incorporate the finding and a brief statement... and comment procedures prescribed by the APA are unnecessary because the final rule makes technical... Asked Questions, and the FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual. (iii...

  1. Don't ask or tell: Pay secrecy policies in U.S. workplaces.

    Science.gov (United States)

    Rosenfeld, Jake

    2017-07-01

    How widespread are workplace rules against discussing wages and salaries in the U.S.? And what are the core correlates of whether or not an employer prohibits or discourages this type of speech? Using a unique dataset that includes a measure of whether workers are prohibited or discouraged from discussing pay, this article investigates the prevalence of pay secrecy policies, and what worker- and workplace-level characteristics are associated with these rules. Key findings reveal that these policies are commonplace, despite being illegal, and that they are concentrated in more "coercive" rather than "enabling" organizations. These more coercive workplaces are disproportionately in the private sector, lack union representation, and have managers that are generally punitive in their approach and unaccommodating of employees. Findings also indicate that the greater discretion pay secrecy provides managers does not result in discriminatory application of these rules to women, racial/ethnic minorities, or immigrants. The article concludes with a call for data collection efforts that would allow researchers to analyze the consequences of this widespread managerial practice. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. The dilemma of secrecy in the study of three ethnic groups from the South American Gran Chaco

    Directory of Open Access Journals (Sweden)

    Guadalupe BARÚA

    2013-12-01

    Full Text Available From an epistemological perspective, ethics poses a problem that goes beyond the issue of the stakeholders’ rationality or irrationality. Besides, it refers to the conceptual framework of knowledge, practices, and emotions allowed and forbidden within the group, as well as to their possible revelation to the researcher. This compels us to reconsider group secrets and their disclosure to the anthropologist. Undoubtedly, the resolution of this problem attempts to introduce a novel topic both concerning ethnographic fieldwork and anthropological reflection. Our examples are provided by the Wichi and Chorote Indians of the Argentine Chaco and by the Nivaclé of the Paraguayan Chaco. Secrets usually fall within the private sphere, whose meaning differs among these cultures: it may be based on a reasonable respect for intimacy, but also on the attribution of cosmological disorder that manifests the disintegration of the world. According to our experience, rubbish, body waste, corpses, or the violation of modesty as required by sexual relations attest to such disorder. Hence, all those topics associated either with Life or Death should occur not only in private but in a protected environment. We bring forward these issues by classifying secrecy into the following fields: 1 cognitive; 2 gender differences; 3 emotions; 4 offense; 5 guilt; 6 new forms of secrecy and disclosure. In this paper, the relevance of secrets is shown in unexpected situations arising from an interaction that takes place on the boundaries of standardised knowledge, and may contribute to the enhancement of anthropological knowledge while revealing unforeseen topics.

  3. An Optimal Joint User Association and Power Allocation Algorithm for Secrecy Information Transmission in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Rong Chai

    2017-01-01

    Full Text Available In recent years, heterogeneous radio access technologies have experienced rapid development and gradually achieved effective coordination and integration, resulting in heterogeneous networks (HetNets. In this paper, we consider the downlink secure transmission of HetNets where the information transmission from base stations (BSs to legitimate users is subject to the interception of eavesdroppers. In particular, we stress the problem of joint user association and power allocation of the BSs. To achieve data transmission in a secure and energy efficient manner, we introduce the concept of secrecy energy efficiency which is defined as the ratio of the secrecy transmission rate and power consumption of the BSs and formulate the problem of joint user association and power allocation as an optimization problem which maximizes the joint secrecy energy efficiency of all the BSs under the power constraint of the BSs and the minimum data rate constraint of user equipment (UE. By equivalently transforming the optimization problem into two subproblems, that is, power allocation subproblem and user association subproblem of the BSs, and applying iterative method and Kuhn-Munkres (K-M algorithm to solve the two subproblems, respectively, the optimal user association and power allocation strategies can be obtained. Numerical results demonstrate that the proposed algorithm outperforms previously proposed algorithms.

  4. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    imperfect main channel estimation at the transmitter. Inner and outer bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate is a simple on-off scheme using a

  5. 37 CFR 5.5 - Permit to disclose or modification of secrecy order.

    Science.gov (United States)

    2010-07-01

    ... to file must be made known, as well as all attorneys, agents and others to whom the material will be....C. 182, shall be made by a “permit” or “modification” of the secrecy order. (b) Petitions for a... explanation of such clearance should be made in the petition including the name of the agency or department...

  6. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2014-01-01

    for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case

  7. Decree of 17 June 1971, Stb. 420, concerning the implementation of Section 68 of the Nuclear Energy Act (Nuclear Energy Act (Secrecy) Decree)

    International Nuclear Information System (INIS)

    1971-01-01

    This Decree lays down that rules may be made to secure the secrecy of a number of nuclear matters. An obligation to observe secrecy may be imposed upon persons engaged in the nuclear activities listed in the Decree if the interest of the State so requires. The competent Minister for the activity concerned is empowered to impose this obligation. (NEA) [fr

  8. Cooperative jamming power control to enhance secrecy communications of AF Relaying systems for Rayleigh fading channel

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2012-01-01

    allocation; (i) rate-optimal power allocation and (ii) outage-optimal power allocation. More specifically, without the instantaneous channel knowledge for the eavesdropper side, the outage probability of the secrecy rate is minimized with respect

  9. The End of Bank Secrecy? An Evaluation of the G20 Tax Haven Crackdown

    DEFF Research Database (Denmark)

    Johannesen, Niels; Zucman, Gabriel

    During the ¿nancial crisis, G20 countries compelled tax havens to sign bilateral treaties providing for exchange of bank information. Policymakers have celebrated this global initiative as the end of bank secrecy. Exploiting a unique panel dataset, we study how the treaties a¿ected bank deposits ...

  10. Public knowledge and common secrets. Secrecy and its limits in the early modern Netherlands

    NARCIS (Netherlands)

    Davids, C.A.

    2005-01-01

    Openness of knowledge was in the Dutch Republic no more a natural state of affairs than in other parts of Europe at the time, but it became dominant there at an earlier date than elsewhere. This puzzling phenomenon is the subject of this essay. The article shows that tendencies to secrecy in crafts

  11. Understanding Research Strategies to Improve ERA Performance in Australian Universities: Circumventing Secrecy to Achieve Success

    Science.gov (United States)

    Diezmann, Carmel M.

    2018-01-01

    Many Australian universities have prioritised improving discipline performance on the national research assessment--Excellence for Research in Australia. However, a "culture of secrecy" pervades "Excellence in Research for Australia" (ERA). There are no specified criteria for the assignment of ratings on a 5-point scale ranging…

  12. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation

    KAUST Repository

    Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider a wiretap channel consisting of a source with multiple antennas, a legitimate receiver and an eavesdropper with a single antenna each. The channels between the source and the receivers undergo fast fading. We assume that the transmitter, in addition to the statistics of both channels, is only aware of a noisy version of the CSI to the legitimate receiver referred to as main channel. The legitimate receiver is aware of both its instantaneous channel gain and the transmitter's estimate of the main channel. On the other hand, the eavesdropper's receiver, in addition to its instantaneous channel realization, is aware of the actual main CSI and the transmitter's estimate as well. While the capacity of this channel is still open even with perfect CSI at the transmitter, we provide in this paper upper and lower bounds on the secrecy capacity. The upper bound is tighter than the one corresponding to perfect main CSI and the gap between the two upper bounds is characterized in function of the channel estimation error variance, at high-SNR. Furthermore, we show that our upper and lower bounds coincide in the case of no main CSI providing a trivial secrecy capacity.

  13. 76 FR 10234 - Amendment to the Bank Secrecy Act Regulations-Reports of Foreign Financial Accounts

    Science.gov (United States)

    2011-02-24

    ... reporting requirement accounts located in jurisdictions that are not considered to be ``tax havens'' or that... report titled, Tax Haven Abuses: the Enablers, the Tools and Secrecy, Senate Hearing 109-797, 109th Cong... determined to have a high degree of usefulness in criminal, tax, regulatory, and counter-terrorism matters...

  14. Cooperative jamming power control to enhance secrecy communications of AF Relaying systems for Rayleigh fading channel

    KAUST Repository

    Park, Kihong

    2012-09-01

    In this paper, we investigate secrecy communications in two-hop wireless relaying networks which consist of one source, one amplify-and-forward (AF) relay, one legitimate destination, and one eavesdropper. To prevent the eavesdropper from intercepting the source message, we make the destination send the intended noise to the AF relay during the first phase. This is referred to as cooperative jamming. According to the channel information at the destination, we address two types of jamming power allocation; (i) rate-optimal power allocation and (ii) outage-optimal power allocation. More specifically, without the instantaneous channel knowledge for the eavesdropper side, the outage probability of the secrecy rate is minimized with respect to the intended noise power level. We show that the outage-optimal allocation gives almost the same outage probability as the rateoptimal one. In addition, the jamming power consumption can be significantly reduced compared to the fixed and rate-optimal power allocation methods. © 2012 IEEE.

  15. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation

    KAUST Repository

    Rezki, Zouheir

    2014-12-01

    We consider a wiretap channel consisting of a source with multiple antennas, a legitimate receiver and an eavesdropper with a single antenna each. The channels between the source and the receivers undergo fast fading. We assume that the transmitter, in addition to the statistics of both channels, is only aware of a noisy version of the CSI to the legitimate receiver referred to as main channel. The legitimate receiver is aware of both its instantaneous channel gain and the transmitter\\'s estimate of the main channel. On the other hand, the eavesdropper\\'s receiver, in addition to its instantaneous channel realization, is aware of the actual main CSI and the transmitter\\'s estimate as well. While the capacity of this channel is still open even with perfect CSI at the transmitter, we provide in this paper upper and lower bounds on the secrecy capacity. The upper bound is tighter than the one corresponding to perfect main CSI and the gap between the two upper bounds is characterized in function of the channel estimation error variance, at high-SNR. Furthermore, we show that our upper and lower bounds coincide in the case of no main CSI providing a trivial secrecy capacity.

  16. 76 FR 72878 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Imposition of...

    Science.gov (United States)

    2011-11-28

    ... Iran as a Jurisdiction of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network... Republic of Iran (``Iran'') is a jurisdiction of primary money laundering concern pursuant to 31 U.S.C... Act amends the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S...

  17. 77 FR 33635 - Amendment to the Bank Secrecy Act Regulations-Requirement That Clerks of Court Report Certain...

    Science.gov (United States)

    2012-06-07

    ... business rule reflects that the definition of currency used therein is slightly different from the... Amendment to the Bank Secrecy Act Regulations--Requirement That Clerks of Court Report Certain Currency...: FinCEN is amending the rules relating to the reporting of certain currency transactions consistent...

  18. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

    Directory of Open Access Journals (Sweden)

    T.-T. Phu

    2016-12-01

    Full Text Available In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagami-m fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC, which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis.

  19. Secrecy, simultaneous discovery, and the theory of nuclear reactors

    International Nuclear Information System (INIS)

    Weart, S.

    1977-01-01

    The history of nuclear reactors gives us a singular opportunity to study what happens when the world's leading physicists, faced with the same problem, find solutions in complete isolation from one another. This paper takes as an example an elementary part of reactor theory, the four-factor formula. It was discovered independently at least six times (in France, Germany, the Soviet Union, and the United States). But the groups, separated by wartime secrecy, used the formula in very different ways. Usually it was simply ignored. In only two cases was the formula integrated with experimental work: by the French and, in an entirely different way, by Fermi's team in Chicago. Thus even though simultaneous discovery occurred, we need not conclude that the physics developed inevitably in a unique pattern

  20. Presencia de sistemas de secreción de patógenos en bacterias endosimbióticas aisladas de Lupinus de la península Ibérica

    OpenAIRE

    Pastor, Víctor; Iglesias, Ana Isabel; Duran Wendt, David Ricardo; Rey Navarro, Luis

    2012-01-01

    Los rizobios son bacterias endosimbióticas capaces de fijar nitrógeno en estructuras especializadas de leguminosas. Esta simbiosis es altamente específica y depende, entre otros factores, de la capacidad de los rizobios de secretar proteínas efectoras a las células vegetales. Se han descrito diferentes sistemas de secreción en patógenos animales y vegetales y posteriormente también se han encontrado en algunos rizobios. En este trabajo se presenta el estudio de varios sistemas de secreción id...

  1. Becoming a morther by non-anonymous egg donation: secrecy and the relationship between egg recipient, egg donor and egg donation child

    NARCIS (Netherlands)

    Berkel, D.A.M. van; Candido, A.; Pijffers, W.H.

    The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through

  2. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    Science.gov (United States)

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  3. On the Secrecy Capacity of 5G New Radio Networks

    Directory of Open Access Journals (Sweden)

    Ke Xiao

    2018-01-01

    Full Text Available The new radio technology for the fifth-generation wireless system has been extensively studied all over the world. Specifically, the air interface protocols for 5G radio access network will be standardized by the 3GPP in the coming years. In the next-generation 5G new radio (NR networks, millimeter wave (mmWave communications will definitely play a critical role, as new NR air interface (AI is up to 100 GHz just like mmWave. The rapid growth of mmWave systems poses a variety of challenges in physical layer (PHY security. This paper investigates those challenges in the context of several 5G new radio communication technologies, including multiple-input multiple-output (MIMO and nonorthogonal multiple access (NOMA. In particular, we introduce a ray-tracing (RT based 5G NR network channel model and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio frequency (RF environment through numerical experiments.

  4. Financial transparency in Britain’s secrecy jurisdictions has just got a whole lot murkier following the UK’s decision to leave the EU

    OpenAIRE

    Young, M. A.

    2016-01-01

    In light of recent political events, this commentary aims to provoke and promote a discussion concerning the effect of the UK’s decision to leave the EU, on its ability to regulate financial crime in the Overseas Territories and Crown Dependencies which operate as financial secrecy havens.

  5. Tax haven implications in financial crime

    OpenAIRE

    Daniela Iuliana Radu

    2015-01-01

    The term "tax haven" is often incorrectly used to describe a country because from this point of view, we should use the term "financial secrecy jurisdiction". A certain degree of financial and banking secrecy is characteristic of all states, almost all states requiring a certain level of protection for banking and commercial information. Banking and financial secrecy jurisdictions refuse, nearly always, to violate its own laws on banking secrecy, even when it could be a serious violation of t...

  6. Care and secrecy: being a mother of children living with HIV in Burkina Faso.

    Science.gov (United States)

    Hejoaka, Fabienne

    2009-09-01

    Home care has become a central component of the response to the HIV/AIDS epidemic, displacing caregiving work onto women. While increasing interest has been paid to HIV/AIDS care with a focus on ailing adults and orphan foster care, the issue of caring for children living with HIV has received little attention in the social sciences. Based on ethnographic material gathered in Burkina Faso between November 2005 and December 2006, the aim of this paper was to gain understanding of women who mother and care for children living with HIV in resource-limited countries. The study involved participant observation in community-based organizations in Burkina Faso and semi-structured interviews with 20 women mothering HIV-positive children as well as 15 children infected with HIV, aged between 8 and 18 years. In daily care mothers face many great challenges, ranging from the routine of pill-taking to disturbing discussions with children asking questions about their health or treatment. The results also show how HIV/AIDS-related stigma adds an additional layer to the burden of care, compelling mothers to deal with the tension between secrecy surrounding the disease and the openness required in providing care and receiving social support. As mothers live in fear of disclosure, they have to develop concealment strategies around children's treatment and the nature of the disease. Conversely, some mothers may share their secret with kin members, close relatives or their children to gain social support. As HIV/AIDS care is shaped by secrecy, these findings shed light on mothers' isolation in child care within a context of changing patterns of family bonds and lack of formal psychosocial support addressing child-related issues. Finally, women's engagement in child care invites us to look beyond the essentialist approach of women's vulnerability conveyed by international discourse to characterise the situation of women facing the HIV/AIDS impact.

  7. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

    KAUST Repository

    Eltayeb, Mohammed E.; Choi, Junil; Al-Naffouri, Tareq Y.; Heath, Robert W.

    2017-01-01

    Millimeter wave (mmWave) vehicular communication systems will provide an abundance of bandwidth for the exchange of raw sensor data and support driver-assisted and safety-related functionalities. Lack of secure communication links, however, may lead to abuses and attacks that jeopardize the efficiency of transportation systems and the physical safety of drivers. In this paper, we propose two physical layer (PHY) security techniques for vehicular mmWave communication systems. The first technique uses multiple antennas with a single radio-frequency (RF) chain to transmit information symbols to a target receiver and noise-like signals in nonreceiver directions. The second technique uses multiple antennas with a few RF chains to transmit information symbols to a target receiver and opportunistically inject artificial noise in controlled directions, thereby reducing interference in vehicular environments. Theoretical and numerical results show that the proposed techniques provide higher secrecy rate when compared to traditional PHY security techniques that require digital or more complex antenna architectures.

  8. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

    KAUST Repository

    Eltayeb, Mohammed E.

    2017-03-14

    Millimeter wave (mmWave) vehicular communication systems will provide an abundance of bandwidth for the exchange of raw sensor data and support driver-assisted and safety-related functionalities. Lack of secure communication links, however, may lead to abuses and attacks that jeopardize the efficiency of transportation systems and the physical safety of drivers. In this paper, we propose two physical layer (PHY) security techniques for vehicular mmWave communication systems. The first technique uses multiple antennas with a single radio-frequency (RF) chain to transmit information symbols to a target receiver and noise-like signals in nonreceiver directions. The second technique uses multiple antennas with a few RF chains to transmit information symbols to a target receiver and opportunistically inject artificial noise in controlled directions, thereby reducing interference in vehicular environments. Theoretical and numerical results show that the proposed techniques provide higher secrecy rate when compared to traditional PHY security techniques that require digital or more complex antenna architectures.

  9. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina

    Directory of Open Access Journals (Sweden)

    Di Bartolomeo Susana

    2002-01-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  10. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina

    Directory of Open Access Journals (Sweden)

    Susana Di Bartolomeo

    2002-10-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  11. Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

    Directory of Open Access Journals (Sweden)

    Hung-Yu Chien

    2015-01-01

    Full Text Available Authenticated Diffie-Hellman key agreement (D-H key is the de facto building block for establishing secure session keys in many security systems. Regarding the computations of authenticated D-H key agreement, the operation of modular exponentiation is the most expensive computation, which incurs a heavy loading on those clients where either their computational capacities or their batteries are limited and precious. As client’s privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client’s identity privacy. This paper proposes a new problem: the modified elliptic curves computational Diffie-Hellman problem (MECDHP and proves that the MECDHP is as hard as the conventional elliptic curves computational Diffie-Hellman problem (ECDHP. Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client’s anonymity from outsiders. This new scheme is attractive to those applications where the clients need identity protection and lightweight computation.

  12. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  13. Caracterización físico-química y actividad antimicrobiana de la secreción mucosa de Achatina fulica

    Directory of Open Access Journals (Sweden)

    Andrés E Pereira P

    2016-06-01

    Full Text Available Introducción: El caracol gigante africano Achatina fulica es reconocido como una plaga que afecta la biodiversidad, la Salud Pública y la productividad. Sin embargo, se ha demostrado que su secreción mucosa tiene propiedades cosméticas, cicatrizantes y antimicrobianas. Objetivo: Determinar las características físico-químicas y evaluar la actividad antimicrobiana de la secreción mucosa de Achatina fulica. Metodología: Se hicieron pruebas bioquímicas para la determinación cualitativa y cuantitativa de glúcidos, proteínas y lípidos. Se determinó el contenido de Calcio, Potasio, cloruros, Sodio y Magnesio. Se midieron los parámetros de conductividad eléctrica, potencial óxido-reducción, saturación de oxígeno, oxígeno total disuelto, pH, sólidos disueltos totales. Se realizó un ensayo de actividad antibacteriana por la técnica de microdilución en caldo. Resultados: Se encontraron glúcidos en concentraciones de 582 μg/mL en la fracción soluble y de 62.1 μg/mL en la fracción de mucinas, y proteínas en concentraciones de 836 μg/mL en la fracción soluble y de 1413 μg/mL en la fracción de mucinas. Se observó actividad antimicrobiana frente a las tres cepas ensayadas. Streptococcus agalactiae alcanzó un MIC90 a una concentración de 3,6 mg/mL con la fracción de mucinas; Staphylococcus aureus resistente a meticilina tuvo un MIC50 de 3,3 mg/mL y Escherichia coli un MIC 70 de 3.8 mg/mL. Conclusiones: Se reportan por primera vez las características físicas y los oligoelementos presente en la secreción de Achatina fulica. La actividad antibacteriana obtenida frente a cepas Gram positivas y Gram negativas plantea la necesidad de realizar estudios para purificar las moléculas con dicha actividad, conocer los mecanismos de acción y establecer la inocuidad, entre otros.

  14. [Aspects of data protection in telemedicine].

    Science.gov (United States)

    Vetter, R

    2001-10-01

    Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to

  15. Datenschutz- und Medizinprodukterecht bei Ubiquitous Computing-Anwendungen im Gesundheitssektor / Data protection and medical product law with respect to medical ubiquitous computing applications

    Directory of Open Access Journals (Sweden)

    Skistims, Hendrik

    2011-01-01

    Full Text Available With respect to ubiquitous computing there is a great potential of application, particularly in medicine and health care. This work deals with the legal problems which ubiquitous computing is facing in these areas. At the beginning, issues with respect to data protection and professional secrecy are treated. Afterwards the problem of applicability of medical product law for medical ubiquitous computing applications as well as the resulting requirements for manufactures, operators and users will be discussed.

  16. A Stiff Man-Child Walking: Derrida’s Economy of Secrecy and Faulkner’s “Barn Burning”

    Directory of Open Access Journals (Sweden)

    Michael Wainwright

    2011-12-01

    Full Text Available Working from Jacques Derrida’s contentions about secrecy and authorial responsibility, and paying brief but specific attention to Charles Baudelaire’s “La fausse monnaie” (1869, as suggested by Derridean concerns over capitalist economics, this article studies the manner in which the inviolable and conditional secrets of William Faulkner’s “Barn Burning” (1938 reveal the poststructural tendencies avant la lettre of this leading American modernist.  While Faulkner scholars have focused on the ambivalent language and metaphors deployed in this short story, they have not formerly traced the manner in which “Barn Burning” incites a sense of deconstructive criticism, and have thereby failed to acknowledge Faulkner’s attendant authorial irresponsibility.  This article redresses this critical imbalance.

  17. On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secret multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secret diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secret diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secret diversity gain of the Multiple-Input Multiple-Output (MIMO) wiretap channel. © 2011 IEEE.

  18. A Tale of Two Paranoids: A Critical Analysis of the Use of the Paranoid Style and Public Secrecy by Donald Trump and Viktor Orbán

    Directory of Open Access Journals (Sweden)

    Andria Timmer

    2018-02-01

    Full Text Available Within the last decade, a rising tide of right-wing populism across the globe has inspired a renewed push toward nationalism. Capitalizing on an increasingly chaotic public sphere, leaders are stoking fear in their constituents such that their radical ideologies and hardline policy decisions may be enacted. This article offers a comparative study of two leaders exploiting the vulnerabilities of their respective citizenries: United States President Donald Trump and Hungarian Prime Minister Victor Orbán. Drawing from and reimagining Richard Hofstadter’s germane essay, “The Paranoid Style in American Politics,” we argue that both represent a new manifestation of the paranoid style as it enables (and is enabled by “public secrecy.” By controlling the media and redirecting collective attention by way of rhetorical sleight of hand, the two are able to sow disorder and confusion such that their secrecy may persist out in the open. Despite using similar issues to promulgate fear and paranoia, most prominently the refugee and immigration crises, and their similar end goals, the two must nonetheless engage in different discursive strategies that reflect the distinct cultures and histories of their respective countries.

  19. PUBLICATION BANS IN A FACEBOOK AGE: HOW INTERNET VIGILANTES HAVE CHALLENGED THE YOUTH CRIMINAL JUSTICE ACT’S “SECRECY LAWS” FOLLOWING THE 2011 VANCOUVER STANLEY CUP RIOT

    Directory of Open Access Journals (Sweden)

    Tania Arvanitidis

    2016-08-01

    Full Text Available On June 15th, 2011, a hockey riot occurred in Vancouver, British Columbia. This event is prominent in Canada’s history for, among other reasons, the unprecedented extent to which it was documented via photographs and video footage. The days that followed the riot saw much of this media documentation uploaded to social media platforms on the Internet, where Internet users worked together to identify and collectively “name and shame” those believed to have been involved in the disturbance. Several individuals targeted by these “Internet vigilantes” were young offenders whose identities are legally protected from publication under the Youth Criminal Justice Act (YCJA. This article examines the phenomenon of “Internet vigilantism”, and raises the issue of whether those provisions within the YCJA that prohibit the identification of youth remain relevant today, given the current difficulties in enforcing these provisions. Following an overview of these “secrecy provisions”, the phenomenon of Internet vigilantism is defined, and challenges posed by acts of Internet vigilantism are discussed. A “naming and shaming” Facebook group created for the purpose of identifying participants in the 2011 Vancouver riot is then looked to as a case study of Internet vigilantism in action. This article concludes with recommendations for how justice officials and social media outlets may modify current practices to better protect the safety and security of young offenders, and to minimize harmful instances of Internet vigilantism.

  20. A new jamming technique for secrecy in multi-antenna wireless networks

    KAUST Repository

    Bakr, Omar

    2010-06-01

    We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms. © 2010 IEEE.

  1. Secrecy’s Corrupting Influence on Democratic Principles and the Rule of Law

    Directory of Open Access Journals (Sweden)

    Greg Martin

    2017-11-01

    Full Text Available Sometimes secrecy in law is required to protect vulnerable witnesses or suppress sensitive evidence. However, particularly since the terror attacks of 11 September 2001, governments in liberal democratic societies have increased secrecy and the use of clandestine procedures under the pretext of safeguarding national security. In many instances, these developments have eroded civil liberties, infringed upon constitutional guarantees, and had negative effects on due process rights. In Australia, where individual rights and freedoms have only limited constitutional expression, it is hoped the doctrine of representative and responsible government will act as sufficient protection for human rights. Conversely, drawing on examples ranging from the regulation of immigration to the control of serious organised crime, this article proposes that escalating secrecy in the current era has a corrupting effect on democratic principles and the rule of law.

  2. Glucemia, insulinemia y secreción de insulina en ratas prepúberes hiperandrogenizadas e hiperestrogenizadas Glycemia, insulinemia and insulin secretion in prepubescent rats receiving high doses of androgens and strogens

    Directory of Open Access Journals (Sweden)

    Aimée Álvarez Álvarez

    2001-04-01

    Full Text Available Se estudió el efecto de una sobredosis de enantato de testosterona y de benzoato de estradiol en ratas machos prepúberes, sobre el comportamiento de la glucemia y la insulinemia in vivo, durante una prueba de tolerancia a la glucosa. Adicionalmente se exploró, in vitro, la capacidad de secreción de insulina estimulada por glucosa de los islotes de Langerhans de estas ratas hiperandrogenizadas e hiperestrogenizadas. Se encontró que la hiperandrogenización se acompañaba de un deterioro de la sensibilidad a la insulina, con hiperinsulinemia, que no se corresponde con un aumento de la capacidad de secreción de insulina de los islotes de Langerhans. Sin embargo, se comprobó que la hiperestrogenización no indujo cambios en los perfiles de glucemia, ni de insulinemia, ni en la capacidad de secreción de insulina de los islotes de Langerhans de este grupo de ratas hiperestrogenizadas.The effect of an overdose of testosterone heptanoate and estradiol in male prepubescent rats on the behavior of glycemia and insulinemia was studied in vivo during a glucose tolerance test. The capacity of insulin secretion stimulated by glucose from the islets of Langerhans of these rats that were administered a high dose of androgens and estrogens was explored in vitro. It was found that the high level of circulating androgens was accompanied by a deterioration of sensitivity to insulin with hyperinsulinemia that does not correspond to an increase of the insulin secreting capacity of the islets of Langerhans. However, it was demonstrated that the high level of circulating estrogens did not produce changes either in the glycemia and insulinemia profiles or in the insulin secreting capacity of the islets of Langerhans in this group of rats that received an elevated dose of estrogens.

  3. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  4. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  5. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels

    Directory of Open Access Journals (Sweden)

    Mike Burmester

    2017-07-01

    Full Text Available The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT, and in particular Radio Frequency Identification (RFID technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.

  6. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.

    Science.gov (United States)

    Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino

    2017-07-04

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.

  7. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels †

    Science.gov (United States)

    Ortiz, Andrés

    2017-01-01

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637

  8. Does secrecy provide ample protection for traditional knowledge

    African Journals Online (AJOL)

    Administrator

    combined with the economic imperative to acquire exclusive rights over .... through independent development such as reverse engineering. Where ..... commercial activity with their traditional knowledge in the ordinary course of events,.

  9. Protecting traditional knowledge - Does secrecy offer a solution ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 13, No 4 (2010) >. Log in or Register to get access to full text downloads.

  10. Taxonomía de onicóforos de Santander, Colombia y termogravimetría, calorimetría de barrido diferencial y espectroscopía infrarroja de la secreción adhesiva (Onychophora: Peripatidae

    Directory of Open Access Journals (Sweden)

    Javier H Jerez-Jaimes

    2009-09-01

    Full Text Available Redescribimos taxonómicamente el gusano Macroperipatus geagy Bouvier 1899, a partir de 15 especímenes recolectados en los cafetales de hacienda El Roble, Santander, Colombia. De acuerdo con la reconstrucción en tres dimensiones de la superficie dorsal del cuerpo, las papilas primarias y accesorias de M. geagy se distribuyen sin formar un patrón determinado. Características diagnósticas: un diente accesorio y un diente principal en la mandíbula externa; y un diente principal, un diente accesorio y siete dentículos en la sierra de la mandíbula interna. Cuerpo: longitud (X=45.66; S=26.10 mm, peso (X= 0.95; S= 2.21 y pares de lobopodos (X= 28.13; S= 1.30. Se elaboró una clave para seis especies de Macroperipatus. La secreción adhesiva en estado líquido perdió 60% del peso inicial al alcanzar los 70 ºC, la muestra sólida perdió el 13% del peso cerca de los 90 ºC, la fase de estabilidad térmica de la secreción estuvo entre los 90 y 280 ºC en la secreción líquida y entre los 100 y 205 ºC en la sólida. La temperatura de inicio de la degradación de las muestras se registró a los 355 ºC. En comparación con la araña Nephila sp., el onicóforo perdió mayor porcentaje de peso y alcanzó la fase de degradación a temperaturas más bajas. Los cambios en el flujo de calor en la secreción adhesiva sólida y líquida de M. geagy fueron confirmados con el comportamiento de las muestras en el análisis de termogravimetría. La proporción de láminas beta calculado en el espectro infrarrojo de la secreción adhesiva fue del 59%. La presencia de este tipo de conformación de la estructura secundaria de las proteínas en la secreción adhesiva de M. geagy conferiría extensibilidad y resistencia a la tracción, en similitud con las fibras de seda tejidas por las arañas para depredación.Velvet worm taxonomy from Santander, Colombia and thermogravimetry, differential scanning calorimetry and infrared spectroscopy of the adhesive

  11. Official announcement of the directive on protection of nuclear power plant equipped with LWR-type reactors from human intrusion or other interference by third parties. Announcement of BMU (German Federal Ministry Environment), of 6 Dec. 1995 - RS I 3 13151 - 6/14

    International Nuclear Information System (INIS)

    1996-01-01

    An operating permit for a nuclear power plant is to be granted only if the applicant and facility operator presents evidence guaranteeing the legally required physical protection and other security measures for protection from human instrusion and other type of interference. As a basis for review and licensing, the competent authorities in 1987 have issued a directive specifying the requirements to be met for physical protection of nuclear power plant equipped with PWR-type reactors, and in 1994 followed a second, analogous directive relating to nuclear power plant with BWR-type reactors. The directive now announced for physical protection of nuclear power plant equipped with LWR-type reactors combines and replaces the two former ones, and from the date of the announcement is the only applicable directive. The text of the directive is not reproduced for reasons of secrecy protection. (orig./CB) [de

  12. O Serviço de Informações e a cultura do segredo The Secret Service and the culture of secrecy

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2012-12-01

    Full Text Available Neste texto revisitamos a formação dos serviços de inteligência no Brasil e sua adaptação à cultura do segredo. Também avaliamos como a existência de serviços de inteligência no interior das forças armadas modificaram a estratégia de atuação castrense no âmbito interno, utilizando como exemplo a campanha Marajoara, terceira empreitada militar na guerrilha do Araguaia.In this paper we revisit the formation of intelligence services in Brazil and its adaptation to the culture of secrecy. We also evaluate how the existence of intelligence services within the armed forces have changed the strategy of action in the framework military built, using the example of the Marajoara campaign in Araguaia guerrilla.

  13. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  14. 39 CFR 958.12 - Depositions; interrogatories; admission of facts; production and inspection of documents.

    Science.gov (United States)

    2010-07-01

    ... limitations on the scope, method, time and place for discovery, and provisions for protecting the secrecy of... designated documents or objects, not privileged, specifically identified, and their relevance and materiality...

  15. 78 FR 42999 - Financial Crimes Enforcement Network; Comment Request; Renewal Without Change-Administrative...

    Science.gov (United States)

    2013-07-18

    ... made available for review as soon as possible but no earlier than five business days after the close of... proceedings, or in the conduct of intelligence or counter-intelligence activities, to protect against... expanding the scope of the Bank Secrecy Act to intelligence or counter-intelligence activities to protect...

  16. Clonación y caracterización de CaSEC14 : un gen inmplicado en la ruta de secreción de proteínas en "Candida albicans"

    OpenAIRE

    Monteoliva Díaz, Lucía

    1997-01-01

    Uno de los objetivos fundamentales de nuestro grupo de investigación es la identificación de distintas funciones celulares de la célula fúngica que puedan utilizarse en el desarrollo de nuevos fármacos antifungicos. En este trabajo se ha clonado y caracterizado el gen casec14 de la levadura patógena oportunista candida albicans, implicado en la ruta de secreción de proteínas. Dicho gen codifica una proteína, casec14p, que presenta una secuencia con elevada homologa (67%) con otras proteínas s...

  17. Toward Secure Services from Untrusted Developers

    National Research Council Canada - National Science Library

    Brodsky, Micah; Efstathopoulos, Petros; Kaashoek, Frans; Kohier, Eddie; Krohn, Maxwell; Mazieres, David; Morris, Robert; VanDeBogart, Steve; Yip, Alexander

    2007-01-01

    .... Instead, owners may choose to reveal their data in a controlled manner. This application model is demonstrated by Muenster, a job search website that protects both the integrity and secrecy of each user's data...

  18. Protecting Cryptographic Keys and Functions from Malware Attacks

    Science.gov (United States)

    2010-12-01

    2009. 92 [17] D. Chaum and E. Van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology — Eurocrypt ’91, pages 257–265, Berlin...and David A. Patterson. Computer Architecture - A Quantitative Ap- proach. Morgan Kaufmann Publishers, pub-MORGAN-KAUFMANN:adr, third edition, 2002...to provide data secrecy for user appli- cations on a per-page basis. In David Gregg, Vikram S. Adve, and Brian N. Bershad, editors, Proceedings of the

  19. Ice parties among young men who have sex with men in Thailand: Pleasures, secrecy and risks.

    Science.gov (United States)

    Guadamuz, Thomas E; Boonmongkon, Pimpawun

    2018-05-01

    Crystal methamphetamine (ice) has become the substance of choice among young men who have sex with men (YMSM) in urban Thailand. Yet, there is scarce data on this phenomenon, partly due to the difficulty in accessing men who will disclose and openly discuss the social contexts, meanings and risks surrounding ice practice. We present an ethnography of ice parties, critically discussing the in-depth social meanings of ice; the sexual socialities and the secrecy surrounding its use; the transactions between older and younger men; and the role of the Internet and mobile technology. Forty repeated narrative interviews (life stories), ten focus group discussions, as well as systematic online and offline observations were conducted over a three-year period. Purposive sampling was used to recruit study participants in a variety of online and offline spaces and through working closely with local Thai community-based organizations serving MSM. To be eligible, participants had to be between 18 and 29 years, able to converse in Thai, had used ice, and had anal sex with another man in the past 6 months. We also strived for sample variability with respects to socio-demographic characteristics (e.g., age, educational attainment and living situation). Data analysis was conducted in Thai by two researchers using the constant comparative method based on grounded theory. On surface, participants described ice parties as exclusive, in trend, luxurious, fun and pleasurable-a kind of modern camaraderie among beautiful men. In reality, however, this group phenomenon was a social hierarchy containing several important players with relational power to one another, to the ice itself and to the physical space where ice was being consumed. These players included ice suppliers, party hosts, party guests and "icetenders." The paper also discusses the sociality of secrecy that surrounds ice parties as well as the power relations between older relatively rich men who provide ice and the younger

  20. Unstimulated salivary flow rate, pH and buffer capacity of saliva in healthy volunteers Débito basal, pH y capacidad tampón de la secreción salivar en sujetos sanos

    Directory of Open Access Journals (Sweden)

    C. Fenoll-Palomares

    2004-11-01

    Full Text Available Objectives: to assess the salivary flow rate, pH, and buffer capacity of healthy volunteers, and their relationships with age, gender, obesity, smoking, and alcohol consumption, and to establish the lower-end value of normal salivary flow (oligosialia. Methods: a prospective study was conducted in 159 healthy volunteers (age > 18 years, absence of medical conditions that could decrease salivary flow. Unstimulated whole saliva was collected during ten minutes, and salivary flow rate (ml/min, pH, and bicarbonate concentration (mmol/l were measured using a Radiometer ABL 520. The 5 percentile of salivary flow rate and bicarbonate concentration was considered the lower limit of normality. Results: median salivary flow rate was 0.48 ml/min (range: 0.1-2 ml/min. Age younger than 44 years was associated with higher flow rates (OR 2.10. Compared with women, men presented a higher flow rate (OR 3.19 and buffer capacity (OR 2.81. Bicarbonate concentration correlated with salivary flow rate. The lower-end values of normal flow rate and bicarbonate concentration were 0.15 ml/min and 1.800 mmol/l, respectively. The presence of obesity, smoking, and alcohol consumption did not influence salivary parameters. Conclusions: in healthy volunteers, salivary flow rate depends on age and gender, and correlates with buffer capacity. Obesity, smoking, and alcohol use do not influence salivary secretion.Objetivos: conocer el débito, pH y capacidad tampón de la saliva en sujetos sanos y sus relaciones con edad, sexo, obesidad y hábitos tabáquico y alcohólico, así como establecer la definición de hiposialia. Métodos: estudio observacional prospectivo en 159 voluntarios sanos (> 18 años, sin factores conocidos que disminuyan la secreción salivar. Se ha recogido la saliva total, sin estímulo, durante 10 minutos, determinando su débito (ml/min, pH y capacidad tampón (concentración de bicarbonato en mmol/l mediante autoanalizador Radiometer ABL 520. Se han

  1. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  2. Surviving After Suicide

    Science.gov (United States)

    ... fewer tools for communicating their feelings. Surviving After Suicide Fact Sheet 3 Children are especially vulnerable to feelings of guilt and ... to take care of them. Secrecy about the suicide in the hopes of protecting children may cause further complications. Explain the situation and ...

  3. 40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.

    Science.gov (United States)

    2010-07-01

    ... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...

  4. Copyright or copyleft? An analysis of property regimes for software development

    NARCIS (Netherlands)

    de Laat, PB

    2005-01-01

    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been

  5. La inmunización con productos de excreción-secreción de Trichinella spiralis unido al bloqueo de CTLA-4 produce un elevado grado de protección ante un reto con el parásito

    Directory of Open Access Journals (Sweden)

    José Lino Zumaquero-Ríos

    2017-04-01

    Full Text Available En la búsqueda de una vacuna experimental efectiva contra Trichinella spiralis se han utilizado diferentes estrategias, pero el grado de protección alcanzado en la casi totalidad de los ensayos es insuficiente para lograr un adecuado control de la enfermedad. En la literatura hay evidencias de que moléculas inhibidoras de la activación de los linfocitos T están implicadas en la regulación de la respuesta inmune contra los helmintos. El bloqueo de estas moléculas puede ser un blanco potencial para el tratamiento de las infecciones causadas por estos parásitos. Por otra parte, se ha informado que la inmunización con productos de excreción-secreción de larvas musculares de T. spiralis proporciona una inmunidad protectora parcial. La infección con el parásito induce una elevada población de linfocitos T reguladores que modulan la respuesta inmune. En este trabajo encontramos que la inmunización con antígenos de excreción-secreción de larvas musculares, más el bloqueo de la molécula inhibidora CTLA-4 en los linfocitos T, causa una significativa reducción de las larvas del parásito en un modelo experimental murino. De esta forma, queda demostrado que la eliminación del efecto supresor inducido por el helminto da por resultado una respuesta Th2 protectora más potente.

  6. Identifying and Assessing Effective Mechanisms for Technology Transfer

    Science.gov (United States)

    2007-03-01

    There is a distinct manner in which civilian technology is protected; even though secrecy is one option, as is the case with the Coca - Cola formula...done with the appropriate dedicated resources. They also placed heavy emphasis on acquiring early sponsorship for the technology and be able to set

  7. Restraints on Dissemination of Research Results.

    Science.gov (United States)

    Taylor, Dalmas A.

    1982-01-01

    The issue of constraints on the publication of research results is discussed from the perspective of clashing values: free speech versus censorship in protection of national defense. The problems of secrecy as well as of disclosure are examined. Greater conflict between academe and military interests is foreseen. (MSE)

  8. Negotiating Discourses of Shame, Secrecy, and Silence: Migrant and Refugee Women's Experiences of Sexual Embodiment.

    Science.gov (United States)

    Ussher, Jane M; Perz, Janette; Metusela, Christine; Hawkey, Alexandra J; Morrow, Marina; Narchal, Renu; Estoesta, Jane

    2017-10-01

    In Australia and Canada, the sexual health needs of migrant and refugee women have been of increasing concern, because of their underutilization of sexual health services and higher rate of sexual health problems. Previous research on migrant women's sexual health has focused on their higher risk of difficulties, or barriers to service use, rather than their construction or understanding of sexuality and sexual health, which may influence service use and outcomes. Further, few studies of migrant and refugee women pay attention to the overlapping role of culture, gender, class, and ethnicity in women's understanding of sexual health. This qualitative study used an intersectional framework to explore experiences and constructions of sexual embodiment among 169 migrant and refugee women recently resettled in Sydney, Australia and Vancouver, Canada, from Afghanistan, Iraq, Somalia, South Sudan, Sudan, Sri Lanka, India, and South America, utilizing a combination of individual interviews and focus groups. Across all of the cultural groups, participants described a discourse of shame, associated with silence and secrecy, as the dominant cultural and religious construction of women's sexual embodiment. This was evident in constructions of menarche and menstruation, the embodied experience that signifies the transformation of a girl into a sexual woman; constructions of sexuality, including sexual knowledge and communication, premarital virginity, sexual pain, desire, and consent; and absence of agency in fertility control and sexual health. Women were not passive in relation to a discourse of sexual shame; a number demonstrated active resistance and negotiation in order to achieve a degree of sexual agency, yet also maintain cultural and religious identity. Identifying migrant and refugee women's experiences and constructions of sexual embodiment are essential for understanding sexual subjectivity, and provision of culturally safe sexual health information in order to

  9. Degrees of secrecy in an open environment. The case of electronic theses and dissertations

    Directory of Open Access Journals (Sweden)

    Joachim SCHÖPFE

    2013-12-01

    Full Text Available The open access (OA principle requires that scientific information be made widely and readily available to society. Defined in 2003 as a “comprehensive source of human knowledge and cultural heritage that has been approved by the scientific community”, open access implies that content be openly accessible and this needs the active commitment of each and every individual producer of scientific knowledge. Today, the success of the open access initiative cannot be denied. Yet, in spite of the growing success of the open access initiative, a significant part of scientific and technical information remains unavailable on the web or circulates with restrictions. Even in institutional repositories (IR created to provide access to the scientific output of an academic institution and central vector of the so-called green road to open access, more or less important sectors of the scientific production are missing. This is because of lack of awareness, embargo, deposit of metadata without full text, confidential content etc. This problem concerns in particular electronic theses and dissertations (ETDs that are disseminated with different statuses – some are freely available, others are under embargo, confidential, restricted to campus access (encrypted or not or not available at all. While other papers may be available through alternative channels (journals, monographs etc., ETDs most often are not. Our paper describes a new and unexpected effect of the development of digital libraries and open access, as a paradoxical practice of hiding information from the scientific community and society, partly while sharing it with a restricted population (campus. We try to explain these different shades of grey literature in terms of different degrees of secrecy related to intellectual property, legitimate interests, expected exploitation and trade secrets, and suggest some ways of increasing availability of ETDs in an open environment (inter-lending loan and

  10. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  11. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling; Yang, Liang; Chen, Jianchao; Alouini, Mohamed-Slim

    2018-01-01

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  12. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling

    2018-02-02

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  13. People involved in radiation research and protection - an historical perspective

    International Nuclear Information System (INIS)

    Toussaint, L.F.

    2010-01-01

    Full text: The lives of selected people involved in radiation research are covered in two parts: 1. history of radiation and radioactivity; and 2. historical aspects of radiation and radiation protection in Western Australia. History of radiation/radioactivity: The background of some of the key people involved in early radiation research is discussed. These include Rontgen and Becqucrel who undertook early research into X-rays and radioactivity respectively. As well as the radiation hazards which early radiation scientists faced, there were also social pressures, as exemplified by the life of women such as Marie Curie, particularly after the death of her husband Pierre. Despite this being the time of the so-called 'beautiful years' in Europe, where there was a friendly exchange of ideas between scientists from various countries, there were also protracted disagreements. Some of the scientific findings of the Curies' daughter (Irene Joliot-Curie) and husband (Frederic Joliot-Curie) were vigorously disputed by Lisa Meitner (and colleague Otto Hahn) in Vienna. The 'beautiful years' came to an end when politics intruded and scientists such as Lisa Meitner had to flee from persecution. The splitting of the atom and realisation (by Leo Szilard) that a chain reaction was possible, led to political barriers being erected around scientists. With Europe poised for war, the implication of this science for warfare application was cause for concern among many of the normally free thinking and co-operative scientists. Secrecy now prevailed.

  14. LURING FISCAL REFUGEES: THE HIGHS AND LOWS OF TAX HAVENS

    Directory of Open Access Journals (Sweden)

    Larissa BĂTRÂNCEA

    2014-02-01

    Full Text Available Created mostly for tax purposes and boasting other financial services like asset protection or financial investments, tax havens have been often associated across time with tax incentives and tax noncompliance (either avoidance or evasion. On the grounds of double tax treatise, banking secrecy and lack of collaboration with international tax authorities, tax havens have succeeded to concentrate over 50% of the world’s financial industry and to manage 32 billion dollars, fuelling unfair competition on global market. Lately, due to pressure exerted by international bodies like the OECD, Joint International Tax Shelter Information Center, Seven Country Working Group on Tax Havens, The Leeds Castle Group or the United Nations, many countries have renounced banking secrecy and started to share client details with tax authorities. Amid rapid changes, a new generation of tax havens emerges in the Southern hemisphere.

  15. A randomized efficacy trial of a cognitive-behavioral group intervention to prevent Internet Use Disorder onset in adolescents: The PROTECT study protocol.

    Science.gov (United States)

    Lindenberg, Katajun; Halasy, Katharina; Schoenmaekers, Sophie

    2017-06-01

    The reduction of prevalence rates of Internet Use Disorder (IUD) and its effective treatment are at high priority in both public health and educational policies. School-based preventive interventions facilitate a low-threshold approach for individuals with IUD, who are typically characterized by high therapy avoidance. Moreover, indicated approaches which target adolescents at high-risk show larger effects than universal prevention programs. Simultaneously, they reduce unnecessary burden for the majority of high-school students that is not at-risk. The PROTECT group intervention for indicated prevention of IUD in school settings was developed based on these preventive strategies. Three-hundred and forty adolescents, aged 12-18 years, from 40 secondary schools in Germany, screened for high-risk of IUD onset, are randomly assigned to a) PROTECT preventive intervention group or b) assessment only control group. The tested intervention consists of a cognitive-behavioral 4-session brief-protocol. Follow-up assessments are at 1, 4 and 12 months after admission. Primary outcome is the 12-months incidence rate of IUD. Secondary outcomes are the reduction of IUD and comorbid symptoms as well as the promotion of problem solving, cognitive restructuring and emotion regulation skills. The indicated preventive intervention PROTECT follows the APA-guidelines for psychological prevention, i.e., it is theory- and evidence-based and addresses both risk-reduction and strength-promotion, it considers current research and epidemiology and ethical standards such as professional secrecy and is designed as a systemic intervention at the school-level. It is expected that the intervention decreases risk of IUD onset (incidence rate). ClinicalTrials.gov: NCT02907658.

  16. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  17. 77 FR 70544 - Agency Information Collection Activities; Proposed Information Collection; Comment Request; Bank...

    Science.gov (United States)

    2012-11-26

    ... Activities; Proposed Information Collection; Comment Request; Bank Secrecy Act/Money Laundering Risk... entitled, ``Bank Secrecy Act/Money Laundering Risk Assessment,'' also known as the Money Laundering Risk... collection of information set forth in this document. Bank Secrecy Act/Money Laundering Risk Assessment (OMB...

  18. University Deals with Drug Companies Raise Concerns over Autonomy, Secrecy.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    The large, exclusive research deal the Scripps Research Institute (California) made with one drug company has drawn criticism for conflict of interest. Critics fear researchers will focus more on marketing than on pure science and will protect corporate interests. Much of the deal-making is with foreign companies, sending profits overseas. (MSE)

  19. 78 FR 15121 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Bank...

    Science.gov (United States)

    2013-03-08

    ... Activities; Submission for OMB Review; Comment Request; Bank Secrecy Act/Money Laundering Risk Assessment... information collection titled ``Bank Secrecy Act/Money Laundering Risk Assessment,'' also known as the Money... for review and clearance. Bank Secrecy Act/Money Laundering Risk Assessment (OMB Control Number 1557...

  20. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  1. Cryptographic Primitives with Quasigroup Transformations

    OpenAIRE

    Mileva, Aleksandra

    2010-01-01

    Cryptology is the science of secret communication, which consists of two complementary disciplines: cryptography and cryptanalysis. Cryptography is dealing with design and development of new primitives, algorithms and schemas for data enciphering and deciphering. For many centuries cryptographic technics have been applied in protection of secrecy and authentication in diplomatic, political and military correspondences and communications. Cryptanalysis is dealing with different attacks on c...

  2. Nuclear reactors and fuel storage pools security in France and in Belgium, and the associated reinforcement measures. Press kit

    International Nuclear Information System (INIS)

    Besnard, Manon; Marignac, Yves; Boilley, David; MacKerron, Gordon; Becker, Oda; Lyman, Ed; Zerbib, Jean-Claude; Sotty, Meryl

    2017-10-01

    security systematically oppose any attempt to clarify the state of protection of nuclear facilities against malevolent acts with the argument of 'defence secrecy'. This generalised reliance on secrecy is a formidable trap, for two major reasons. First, it places any observer in an impossible bind by default: working on the basis of public information but in principle completely uninformed of the degree of vulnerability determined by the authorities and any related protection measures (since this information is confidential), the observer is still expected to identify the point at which highlighting and analysing this public information would compromise secrecy and therefore security. Above all, in the event that security vulnerabilities exist at nuclear facilities, and that current action by industrial operators and public authorities aims to hide such flaws for the sake of secrecy, rather than making the necessary reinforcements, how can this problem be addressed without weakening the system under the microscope? It is essential, from the point of view of democratic principles as well as public security, that secrecy in no way be a screen for the authorities to hide such flaws instead of protecting the facilities effectively. This concern is at the heart of the work commissioned by Greenpeace France. This work looks at the current security situation at nuclear facilities and, more specifically, at spent fuel pools at nuclear plants (in France and Belgium) and at the La Hague reprocessing plant (in France). This work was accompanied by very special precautions. The most obvious measure is to release only this summary to the public. Greenpeace will ensure the report is released to only a handful of its members working on the issue and to the relevant authorities in European countries concerned (France, Germany, Belgium, Luxembourg and Switzerland). It should be noted that these precautions are not a reflection of the nature of the information used in the report. This

  3. Secure communication via an energy-harvesting untrusted relay in the presence of an eavesdropper

    Science.gov (United States)

    Tuan, Van Phu; Kong, Hyung Yun

    2018-02-01

    This article studies a secure communication of a simultaneous wireless information and power transfer system in which an energy-constrained untrusted relay, which harvests energy from the wireless signals, helps the communication between the source and destination and is able to decode the source's confidential signal. Additionally, the source's confidential signal is also overheard by a passive eavesdropper. To create positive secrecy capacity, a destination-assisted jamming signal that is completely cancelled at the destination is adopted. Moreover, the jamming signal is also exploited as an additional energy source. To evaluate the secrecy performance, analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity are derived. Moreover, a high-power approximation for the SOP is presented. The accuracy of the analytical results is verified by Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as the energy-harvesting efficiency, secrecy rate threshold, power-splitting ratio, transmit powers, and locations of the relay and eavesdropper, on the secrecy performance.

  4. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  5. Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR

    KAUST Repository

    Rezki, Zouheir

    2012-04-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secrecy multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secrecy diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secrecy diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secrecy diversity gain of the MIMO wiretap channel. © 2012 IEEE.

  6. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  7. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  8. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  9. LURING FISCAL REFUGEES: THE HIGHS AND LOWS OF TAX HAVENS

    OpenAIRE

    Larissa BATRANCEA

    2014-01-01

    Created mostly for tax purposes and boasting other financial services like asset protection or financial investments, tax havens have been often associated across time with tax incentives and tax noncompliance (either avoidance or evasion). On the grounds of double tax treatise, banking secrecy and lack of collaboration with international tax authorities, tax havens have succeeded to concentrate over 50% of the world’s financial industry and to manage 32 billion dollars, fuell...

  10. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  11. Computer Security: transparent monitoring for your protection

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Computer security can be handled in one of two ways: in secrecy, behind a black curtain; or out in the open, subject to scrutiny and with full transparency. We believe that the latter is the only right way for CERN, and have always put that belief into practice. In keeping with this spirit, here is a reminder of how we monitor (your) CERN activities in order to guarantee timely responses to computer security incidents.   We monitor all network traffic coming into and going out of CERN. Automatic tools look for suspicious patterns like connections to known malicious IP addresses, web pages or domains. They check for malicious files being downloaded and make statistical analyses of connections in order to identify unusual behaviour. The automatic analysis of the logs from the CERN Domain Name Servers complements this and provides a redundant means of detection. We also constantly scan the CERN office network and keep an inventory of the individual network services running on each device: w...

  12. Collaborating with the Private Sector

    Science.gov (United States)

    2009-08-01

    circumstances to maintain its secrecy. 110 For information to be considered a trade secret, it must remain a secret. For example, the Coca - Cola recipe... Advertising .‖ Center for Democracy & Technology. 14 Aug. 2009 <http://www.cdt.org/privacy/20080708ISPtraffic.pdf>. 19 18 U.S.C. §§ 2510-2522 20 Hudson...is a trade secret because the recipe has been kept a secret for over 100 years to protect Coca -Cola‘s economic interests. 111

  13. Secrets from friends and parents: longitudinal links with depression and antisocial behavior.

    Science.gov (United States)

    Laird, Robert D; Bridges, Brittanee J; Marsee, Monica A

    2013-08-01

    Keeping secrets from parents is associated with depression and antisocial behavior. The current study tested whether keeping secrets from best friends is similarly linked to maladjustment, and whether associations between secrecy and maladjustment are moderated by the quality of the friendship. Adolescents (N = 181; 51% female, 48% white, non-Hispanic, 45% African American) reported their secrecy from parents and best friends, the quality of their parent-adolescent relationships and best friendships, and their depression and antisocial behavior at ages 12 and 13. Keeping more secrets from best friends was associated with more depression, but not with more antisocial behavior, when controlling for earlier adjustment, secrecy from parents, and the quality of the friendship. For girls associations between maladjustment and secrecy were conditioned by the quality of the relationships and whether secrets were kept from parents and friends. Discussion argues for expanding the study of secrecy in adolescence beyond the parent-child dyad. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  14. 12 CFR 563.180 - Suspicious Activity Reports and other reports and statements.

    Science.gov (United States)

    2010-01-01

    ... transaction related to a money laundering activity or a violation of the Bank Secrecy Act. (2) Definitions... more that involve potential money laundering or violations of the Bank Secrecy Act. Any transaction...

  15. 12 CFR 208.62 - Suspicious activity reports.

    Science.gov (United States)

    2010-01-01

    ... transaction related to a money laundering activity or a violation of the Bank Secrecy Act. This section... or more that involve potential money laundering or violations of the Bank Secrecy Act. Any...

  16. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  17. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  18. Signal processing approaches to secure physical layer communications in multi-antenna wireless systems

    CERN Document Server

    Hong, Y-W Peter; Kuo, C-C Jay

    2013-01-01

    This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will c

  19. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina Prevalence of associated microorganisms in genital discharge, Argentina

    Directory of Open Access Journals (Sweden)

    Susana Di Bartolomeo

    2002-10-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  20. Antisipasi Pelarian Dana Asing ke Luar Negeri Melalui Perlindungan Kontraktual Pembukaan Rahasia Bank

    Directory of Open Access Journals (Sweden)

    Tarsisius Murwaji

    2015-08-01

    invest in other countries’ bank. The creditors, and even Indonesian’s banks costumers, have potential to transfer their money to the banks outside Indonesia. As a result, the fund stored in Indonesian Banks such as saving, deposit, or bond might runagate to the banks in other ASEAN countries. Big investors who think that they lack legal protection will prefer to put their investments in escrow account in banks outside Indonesia, while the position of the Bank of Indonesia’s will only be as executor or project payer. Thus, the Directorate General of Regulation, the Bank of Indonesia, and Indonesia’s Financial Service Authority must take quick action for the harmonization of bank secrecy unveiling regulation to anticipate the realization of AEC. This harmonization should not amend the nature of the bank secrecy regulation from criminal to civil law, but through contractual protection under Bank of Indonesia regulation to redesign the mechanism of bank secrecy unveiling.

  1. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  2. Secrets, silence and the sacred: The communications Trinity of the Catholic Church

    Directory of Open Access Journals (Sweden)

    Stéphane DUFOUR

    2013-12-01

    Full Text Available If the Catholic Church experiences difficulties in today’s world of ‘hyper-communication’ and 24/7 media pressure, esoteric religious language or generalised misuse of the media may not be the only factors to blame. This paper is based on the hypothesis that the reasons run more deeply into the communications ethos of the Catholic Church itself. More precisely, the paper contends that the Church’s communication in the social sphere cannot totally escape the principle of secrecy. This is not to say that there is one particular secret which the Church wishes to keep, rather that the whole Catholic tradition is marked by a culture and practice of secrecy, as shown through such examples as the Seven Seals of The Apocalypse, the Holy Secret of Confession, the Three Secrets of Fatima, meetings held systematically behind closed doors, etc. This contribution will analyse this communicational ethos based on the value of secrecy and on its corollary: mystery, through acts of enunciation involving texts, actors’ strategies, semiotically-charged scenes and everything which helps set the “stage” for a typical instance of religious communication. This cult of secrecy, as far as it can be identified, enters inevitably into conflict with the value of transparency. The dialectical relationship between secrecy and transparency leads us to focus our analysis on the tension between the Church’s desire to respect secrecy, to retain information and to remain silent, and the demands of visibility immediacy and openness we associate with information-based society.

  3. Delay and Secrecy

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Toole, Andrew A.

    2015-01-01

    examines the relationship between industry sponsorship and restrictions on disclosure using individual-level data on German academic researchers. Accounting for self-selection into extramural sponsorship, our evidence strongly supports the perspective that industry sponsorship jeopardizes public disclosure......The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. Aggregate data from the OECD show a broad shift in the institutional financing structure that supports academic research from public to private sponsorship. This article...

  4. Delay and Secrecy

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Toole, Andrew A.

    examines the relationship between industry sponsorship and restrictions on disclosure using individual-level data on German academic researchers. Accounting for self-selection into extramural sponsorship, our evidence strongly supports the perspective that industry sponsorship jeopardizes public disclosure......The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. Aggregate data from the OECD show a broad shift in the institutional financing structure that supports academic research from public to private sponsorship. This paper...

  5. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana; Volume 40; Issue 7 ... The proposed protocol provides such security attributes as forward secrecy, backward secrecy, and defense against man in the middle (MITM) and Unknown keyshare security attacks and also authentication along with privacy preserving attributes like anonymity, traceability ...

  6. Compound Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Kramer Gerhard

    2009-01-01

    Full Text Available Abstract This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is kept in full ignorance about the message. The compound wiretap channel can also be viewed as a multicast channel with multiple eavesdroppers, in which the transmitter sends information to all receivers and keeps the information secret from all eavesdroppers. For the discrete memoryless channel, lower and upper bounds on the secrecy capacity are derived. The secrecy capacity is established for the degraded channel and the semideterministic channel with one receiver. The parallel Gaussian channel is further studied. The secrecy capacity and the secrecy degree of freedom ( are derived for the degraded case with one receiver. Schemes to achieve the for the case with two receivers and two eavesdroppers are constructed to demonstrate the necessity of a prefix channel in encoder design. Finally, the multi-antenna (i.e., MIMO compound wiretap channel is studied. The secrecy capacity is established for the degraded case and an achievable is given for the general case.

  7. 12 CFR Appendix B to Part 748 - Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice

    Science.gov (United States)

    2010-01-01

    ..., SUSPICIOUS TRANSACTIONS, CATASTROPHIC ACTS AND BANK SECRECY ACT COMPLIANCE Pt. 748, App. B Appendix B to Part... Catastrophic Act and Bank Secrecy Act Compliance regulation, 29 interprets section 501(b) of the Gramm-Leach... response program. 38 See FFIEC Information Technology Examination Handbook, Outsourcing Technology Services...

  8. 75 FR 2929 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Science.gov (United States)

    2010-01-19

    ... soliciting comments concerning an information collection titled ``Bank Secrecy Act/Money Laundering Risk Assessment'' (a.k.a. Money Laundering Risk (MLR) System). The OCC also gives notice that it has sent the... approval for the following information collection: Title: Bank Secrecy Act/Anti-Money Laundering Risk...

  9. Access to data and material for research: Putting empirical evidence into perspective

    NARCIS (Netherlands)

    Rodriguez, V.

    2009-01-01

    The aim of this article is to put into critical perspective the empirical findings on secrecy and withholding in research. In other words, by taking existing empirical literature into account, it is intended that a crucial question is answered: Is secrecy and withholding in research harmful or

  10. Mother-adolescent monitoring dynamics and the legitimacy of parental authority.

    Science.gov (United States)

    Keijsers, Loes; Laird, Robert D

    2014-07-01

    This multi-informant longitudinal study aimed to understand whether the family dynamics that underlie adolescent voluntary disclosure regarding their leisure time behavior differs when adolescents strongly or weakly endorse the legitimacy of parental authority. Longitudinal linkages between parental monitoring behaviors and adolescents' secrecy and disclosure were tested among youths with strong and weak legitimacy beliefs. The sample included 197 adolescents (51% female, M age 12 years) and their mothers. Mothers reported on several of their own monitoring efforts (i.e., solicitation, active involvement, observing and listening, and obtaining information from spouses, siblings, and others). Adolescents reported their disclosure, secrecy, and legitimacy beliefs. Only among youths reporting strong legitimacy beliefs, more mother engagement and supervision (indexed by mother-reported active involvement and observing and listening) predicted more adolescent disclosure and less secrecy over time, and more mother solicitation predicted less secrecy. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  11. Secure Degrees of Freedom of the Gaussian Z Channel with Single Antenna

    Directory of Open Access Journals (Sweden)

    Xianzhong XIE

    2014-03-01

    Full Text Available This paper presents the secrecy capacity and the secure degrees of freedom of Gaussian Z channel with single antenna and confidential information. Firstly, we analysis the secrecy capacity and the upper bound of secure degrees of freedom of this channel in theory. Then, we respectively discuss the security pre-coding scheme for real Gaussian channel model and frequency selection channel model. Under the first model, through real interference alignment and cooperative jamming, we obtain the secrecy capacity and secure degrees of freedom, proving that it can reach the upper bound of secure degrees of freedom in theory. While, under the second one, a strong security pre-coding algorithm is proposed, which is based on the fact that sparse matrix has strong hash property. Next, we arrange interference with interference alignment and the receivers process their received signal through zero forcing algorithm. At last, the messages are reconstructed with maximum likelihood decoding, where it shows that the algorithm can asymptotically achieve the optimal secrecy capacity.

  12. Associations Between Secret-Keeping and Quality of Life in Older Adults.

    Science.gov (United States)

    Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M

    2018-01-01

    This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.

  13. On the input distribution and optimal beamforming for the MISO VLC wiretap channel

    KAUST Repository

    Arfaoui, Mohamed Amine; Rezki, Zouheir; Ghrayeb, Ali; Alouini, Mohamed-Slim

    2017-01-01

    We investigate in this paper the achievable secrecy rate of the multiple-input single-output (MISO) visible light communication (VLC) Gaussian wiretap channel with single user and single eavesdropper. We consider the cases when the location of eavesdropper is known or unknown to the transmitter. In the former case, we derive the optimal beamforming in closed form, subject to constrained inputs. In the latter case, we apply robust beamforming. Furthermore, we study the achievable secrecy rate when the input follows the truncated generalized normal (TGN) distribution. We present several examples which demonstrate the substantial improvements in the secrecy rates achieved by the proposed techniques.

  14. On the input distribution and optimal beamforming for the MISO VLC wiretap channel

    KAUST Repository

    Arfaoui, Mohamed Amine

    2017-05-12

    We investigate in this paper the achievable secrecy rate of the multiple-input single-output (MISO) visible light communication (VLC) Gaussian wiretap channel with single user and single eavesdropper. We consider the cases when the location of eavesdropper is known or unknown to the transmitter. In the former case, we derive the optimal beamforming in closed form, subject to constrained inputs. In the latter case, we apply robust beamforming. Furthermore, we study the achievable secrecy rate when the input follows the truncated generalized normal (TGN) distribution. We present several examples which demonstrate the substantial improvements in the secrecy rates achieved by the proposed techniques.

  15. Compound Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Shlomo Shamai (Shitz

    2009-01-01

    Full Text Available This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is kept in full ignorance about the message. The compound wiretap channel can also be viewed as a multicast channel with multiple eavesdroppers, in which the transmitter sends information to all receivers and keeps the information secret from all eavesdroppers. For the discrete memoryless channel, lower and upper bounds on the secrecy capacity are derived. The secrecy capacity is established for the degraded channel and the semideterministic channel with one receiver. The parallel Gaussian channel is further studied. The secrecy capacity and the secrecy degree of freedom (s.d.o.f. are derived for the degraded case with one receiver. Schemes to achieve the s.d.o.f. for the case with two receivers and two eavesdroppers are constructed to demonstrate the necessity of a prefix channel in encoder design. Finally, the multi-antenna (i.e., MIMO compound wiretap channel is studied. The secrecy capacity is established for the degraded case and an achievable s.d.o.f. is given for the general case.

  16. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  17. 76 FR 33413 - Proposed Renewal Without Change; Comment Request; Nine Bank Secrecy Act Recordkeeping Requirements

    Science.gov (United States)

    2011-06-08

    ... with a caption, in the body of the text, ``BSA Recordkeeping Requirements Comments.'' FOR FURTHER..., or regulatory investigations or proceedings, or in the conduct of intelligence or counter-intelligence activities, including analysis, to protect against international terrorism, and to implement anti...

  18. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  19. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  20. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2015-01-01

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  1. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal

    2015-11-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  2. The Curse of Interesting Times.

    Science.gov (United States)

    Krug, Judith F.

    The Watergate scandal has profoundly shaken the confidence of the American people in their government. One aspect of Watergate which can be immediately corrected is that of secrecy. In the abolition of secrecy and the defense of intellectual freedom, librarians have a role to play. American librarianship has taken upon itself the task of providing…

  3. [Light protection: principles of UV protection].

    Science.gov (United States)

    Stege, H; Mang, R

    2006-05-01

    UV radiation is responsible for the induction of epithelial and melanocytic skin cancer, photoaging, and photodermatoses. UV protection is necessary to prevent damage caused by non-physiologic exposure. UV protection includes not only reduction of sun exposure but also use of sun protective filters, UV protective clothes, DNA repair enzymes, and antioxidant supplementation. Consumers are uncertain about the possibilities and limitations of commercial sun protection measures. Dermatologists must explain protective measures to the general public which continues to believe that UV-tanned skin is healthy. The sunscreen market is a highly competitive but lucrative market. The range of products with different designations and promises makes difficult for both consumers and dermatologists to determine what is sensible UV protection.

  4. Protection Coordination in Electrical Substation Part-2 Unit Protections (Differential and Distance Protection)

    OpenAIRE

    TÜR, Mehmet Rida; Shobole, Abdulfetah; Baysal, Mustafa; Wadi, Mohammed

    2018-01-01

    Power systemsmust be protected against faults to ensure quality and reliable generation,transmission and distribution of power systems. Power system protection is providedby the protection relays. This paper is the second part of the ProtectionCoordination study for the Siddik Kardesler Substation. The protection fortransmission lines, transformer, bus bars and customer feeders is provided byovercurrent protection, differential and distance protection schemes. In thispaper, issues related wit...

  5. 电力二次系统主动安全防御策略及实现%An Active Security Defense Strategy and Its Implementation for the Power Secondary System

    Institute of Scientific and Technical Information of China (English)

    冯兆红; 贾铁军

    2015-01-01

    在分析数据安全和业务安全保护侧重点的基础上,结合电力二次系统结构对系统按数密和业密级别高低进行安全分区。针对电力二次系统的业务实际及其运行过程中存在的不安全因素,对内外网之间进行通信安全部署,提出主动安全防御策略,有效地解决了电力二次系统中存在的数据和业务安全保护的矛盾,提高了系统的检测辨识能力及整体防御功效。%On the basis of analyzing the protection sides of data security and business security,the power secondary system is divided into different sections according to the level of data secrecy and business secrecy.Under consideration of actual business of the power secondary system and unsafe factors in its operation,this paper makes a communication security deployment between the internal and external networks and proposes an active security defense strategy,thus effectively resolving the contradiction between data and business security protection in the power secondary system and improving the detection identification ability of the system.

  6. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  7. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  8. 76 FR 57799 - Agency Information Collection Activities; Proposal That Electronic Filing of Bank Secrecy Act...

    Science.gov (United States)

    2011-09-16

    ..., tax, and regulatory matters, or in the conduct of intelligence or counter-intelligence activities to... scope of the BSA to intelligence or counter-intelligence activities to protect against international... forms that allows users to create templates, reducing data entry but still providing for printing paper...

  9. Information Operations in Pursuit of Terrorists

    Science.gov (United States)

    2007-09-01

    affairs in secrecy.” It was said in the proverbs, "The hearts of freemen are the tombs of secrets" and "Moslems’ secrecy is faithfulness, and talking...and prepare for new attacks.299 In May 2007, Al Qaeda named an Egyptian , Mustafa Ahmed Muhammad Uthman Abu al-Yazid, as the group’s leader for

  10. Fertility regulation as identity maintenance: Understanding the social aspects of birth control.

    Science.gov (United States)

    Marston, Cicely; Renedo, Alicia; Nyaaba, Gertrude Nsorma

    2018-02-01

    We take a dialogical approach to exploring fertility regulation practices and show how they can maintain or express social identity. We identify three themes in educated Ghanaian women's accounts of how they navigate conflicting social demands on their identity when trying to regulate fertility: secrecy and silence - hiding contraception use and avoiding talking about it; tolerating uncertainty - such as using unreliable but more socially acceptable contraception; and wanting to be fertile and protecting menses. Family planning programmes that fail to tackle such social-psychological obstacles to regulating fertility will risk reproducing social spaces where women struggle to claim their reproductive rights.

  11. A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment

    Directory of Open Access Journals (Sweden)

    Chandramohan Dhasarathan

    2015-03-01

    Full Text Available Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a cloud environment using intelligent agent. This paper presents an intelligent model to protect user’s valuable personal data. Preserving proprietor’s data and information in cloud is one of the top most challenging missions for cloud provider. Many researches fanatical their valuable time’s to discover some technique, algorithms and protocols to solve secrecy issue and develop a full-fledged cloud computing standard structure as a newest computing to all cloud users. Some researchers came forward with cryptography technique, cyber middle wear technique, noise injection and third party layer technique to preserve privacy about data in cloud. We propose a hybrid authentication technique as an end point lock. It is a composite model coupled with an algorithm for user’s privacy preserving, which is likely to be Hash Diff Anomaly Detection and Prevention (HDAD. This algorithmic protocol acts intelligently as a privacy preserving model and technique to ensure the users data are kept more secretly and develop an endorsed trust on providers. We also explore the highest necessity to maintain the confidentiality of cloud user’s data.

  12. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  13. The security system of nuclear installations and its impact on labour law

    International Nuclear Information System (INIS)

    Daeubler, W.

    1984-01-01

    'Hazardous technologies', in particular nuclear technology, are a challenge to labour law because in these branches of industry, selection of personnel and employment conditions are completely governed by government regulations, and codetermination rights often are neutralized due to security regulations. The author investigates ways and means of reconciling the interests of security provisions on the one hand, and of codetermination rights on the other. The crucial points in this context are inevitable measures such as security screening of personnel, surveillance and physical protection measures, secrecy protection. The author discusses the difficult issue of whether there are possibilities to off-set the curtailments of the right of codetermination by new ways and means of participation by employees which ought to be offered on a higher level, i.e. on the authorities level rather than on the level of industrial plants. (HSCH) [de

  14. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  15. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong

    2013-09-01

    In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. © 1983-2012 IEEE.

  16. The Methods of Information Security Based on Blurring of System

    Directory of Open Access Journals (Sweden)

    Mikhail Andreevich Styugin

    2016-03-01

    Full Text Available The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shannon Secrecy are made. The method of system blurring is defined. Theoretically cryptographically strong of absolutely indiscernible data transfer channel is proved and its practical unbreakable against unreliable pseudo random number generator is shown. This paper present system with blurring of channel named Pseudo IDTC and shown asymptotic complexity of break this system compare with AES and GOST.

  17. Secure Multiple-Antenna Block-Fading Wiretap Channels with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal

    2017-07-18

    In this paper, we investigate the ergodic secrecy capacity of a block-fading wiretap channel with limited channel knowledge at the transmitter. We consider that the legitimate receiver, the eavesdropper and the transmitter are equipped with multiple antennas and that the receiving nodes are aware of their respective channel matrices. The transmitter, on the other hand, is only provided by a B-bit feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error-free public link with limited capacity. The statistics of the main and the eavesdropper channel state information are known at all nodes. Assuming an average transmit power constraint, we establish upper and lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large, i.e. $B \\ ightarrow \\\\infty$ ; hence, fully characterizing the ergodic secrecy capacity in this case. Besides, we analyze the asymptotic behavior of the presented secrecy rates, at high Signal-to-Noise Ratio (SNR), and evaluate the gap between the bounds.

  18. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  19. Secure Multiple-Antenna Block-Fading Wiretap Channels with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, we investigate the ergodic secrecy capacity of a block-fading wiretap channel with limited channel knowledge at the transmitter. We consider that the legitimate receiver, the eavesdropper and the transmitter are equipped with multiple antennas and that the receiving nodes are aware of their respective channel matrices. The transmitter, on the other hand, is only provided by a B-bit feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error-free public link with limited capacity. The statistics of the main and the eavesdropper channel state information are known at all nodes. Assuming an average transmit power constraint, we establish upper and lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large, i.e. $B \\rightarrow \\infty$ ; hence, fully characterizing the ergodic secrecy capacity in this case. Besides, we analyze the asymptotic behavior of the presented secrecy rates, at high Signal-to-Noise Ratio (SNR), and evaluate the gap between the bounds.

  20. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  1. Radiation protection in the field of environmental protection

    International Nuclear Information System (INIS)

    Zhao Yamin

    2003-01-01

    The relationship of radiation protection with environmental protection, the sources that may give rise to the environmental radiation contamination, and the system of radiation protection and the fundamental principles and requirements for radiation environmental management are introduced. Some special radiation protection problems faced with in the radiation environmental management are discussed. (author)

  2. Digital protection in power plants. Electrical unit and line protection. Digital protection systems for NPP

    International Nuclear Information System (INIS)

    Kaczmarek, A.

    2000-01-01

    In this presentation author deals with the digital protection systems for nuclear power plants. The evolution of protection devices, protection concept for power plants, concept of functional redundancy, references for digital protection, benefits for the customer well as concept fault recorder are presented. (author)

  3. Operational radiation protection and radiation protection training

    International Nuclear Information System (INIS)

    Kraus, W.

    1989-01-01

    The radiation protection system in the German Democratic Republic (GDR) is reviewed. The competent authority (the SAAS) and its systems of licensing and supervision are described. Discussion covers the role of the Radiation Protection Officer, the types of radiation monitoring, medical surveillance programs and the classification of workers and work areas. Unusual occurrences in the GDR, 1963-1976, are presented and the occupational radiation protection problems at some specific types of workplaces are discussed. The GDR's system of training in radiation protection and nuclear safety is described. 5 figs., 18 tabs

  4. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  5. Evaluation of protection factor of respiratory protective equipment using indigenously developed protection factor test facility

    International Nuclear Information System (INIS)

    Patkulkar, D.S.; Ganesh, G.; Tripathi, R.M.

    2018-01-01

    Assigned protection factor (APF) is an indicator representing effectiveness of a respirator and it provides workplace level of respiratory protection for workers in providing protection against exposure to airborne contaminants Occupational Safety and Health Administration (OSHA) specifies 'Respirator APF' and 'Maximum Use Concentration' (MUC - a term derived using APF) shall be an integral part of Respirator Protection Standard. MUC establishes the maximum airborne concentration of a contaminant in which a respirator with a given APF may be used. The use of particulate respirators such as half face mask, full face mask and powered air purifying respirators is essential for radioactive jobs in nuclear facilities to prevent any intake of radionuclide. With this impetus, the Protection Factor Test Facility (PFTF) for testing and evaluation of respiratory protective equipment meeting relevant applicable standards was designed, fabricated and installed in Respiratory Protective Equipment Laboratory of Health Physics Division

  6. Diplomatic Protection

    OpenAIRE

    Režná, Jana

    2006-01-01

    Final thesis Topic: Diplomatic protection Thesis supervisor: JUDr. Vladimír Balaš, CSc. Student: Marek Čermák Thesis on the topic of diplomatic protection deals with the granting of exercise of diplomatic protection by the states and is divided into seven chapters which follow each other. The first chapter describes the diplomatic protection and its historical foundations. The second chapter focuses on the possibility of exercise of diplomatic protection in respect of natural persons and the ...

  7. Predicting sun protection behaviors using protection motivation variables.

    Science.gov (United States)

    Ch'ng, Joanne W M; Glendon, A Ian

    2014-04-01

    Protection motivation theory components were used to predict sun protection behaviors (SPBs) using four outcome measures: typical reported behaviors, previous reported behaviors, current sunscreen use as determined by interview, and current observed behaviors (clothing worn) to control for common method bias. Sampled from two SE Queensland public beaches during summer, 199 participants aged 18-29 years completed a questionnaire measuring perceived severity, perceived vulnerability, response efficacy, response costs, and protection motivation (PM). Personal perceived risk (similar to threat appraisal) and response likelihood (similar to coping appraisal) were derived from their respective PM components. Protection motivation predicted all four SPB criterion variables. Personal perceived risk and response likelihood predicted protection motivation. Protection motivation completely mediated the effect of response likelihood on all four criterion variables. Alternative models are considered. Strengths and limitations of the study are outlined and suggestions made for future research.

  8. Physical protection

    International Nuclear Information System (INIS)

    Myers, D.A.

    1989-01-01

    Physical protection is defined and its function in relation to other functions of a State System of Accounting for and Control of Nuclear Materials is described. The need for a uniform minimum international standard for physical protection as well as the need for international cooperation in physical protection is emphasized. The IAEA's INFCIRC/225/Rev. 1 (Annex 1) is reviewed. The Convention on the Physical Protection of Nuclear Material (Annex 2) is discussed. Photographs show examples of typical physical protection technology (Annex 3)

  9. PROTECTION OF WORKS TITLES FROM THE PERSPECTIVE OF COPYRIGHT PROTECTION AND TRADEMARK PROTECTION

    Directory of Open Access Journals (Sweden)

    George-Mihai IRIMESCU

    2017-05-01

    Full Text Available The main purpose of the paper is assessing the possibilities of protecting the titles of works. One possibility is the protection by means of registered or unregistered trademarks. This route presents difficulties because of the distinctiveness perspective. In this sense, the European case-law has recently developed a constant practice and outlined a series of criteria that should be taken into consideration when examining a trademark consisting of a title. Another possibility is protecting the title under the provisions of the copyright law. From this respect, the practice has not yet determined a constant practice. However, the dominant opinion is that the originality criterion should be taken into consideration when assessing the protection of a tile. Finally, brief conclusion are made, including short remarks on the cumulative protection of titles, both as trademarks and under the copyright law.

  10. Designing physical protection technology for insider protection

    International Nuclear Information System (INIS)

    Trujillo, A.A.; Waddoups, I.G.

    1986-01-01

    Since its inception, the nuclear industry has been engaged in providing protection against an insider threat. Although insider protection activities have been fairly successful in the past, present societal conditions require increased protection to further minimize the existence of an insider or the consequences of an insider-perpetrated incident. Integration of insider protection techniques into existing administrative and operational procedures has resulted in economic and operational impacts. Future increases in insider protection may result in even greater impacts, so we must proceed wisely as new approaches are developed. Increased emphasis on background investigations, security clearances, human reliability programs, security awareness activities, and the development of technology to address the insider threat are evidence of continuing concern in this area. Experience ranging from operational test and evaluation of developmental equipment to conceptual designs for new facilities has led to the development of general principles and conclusions for mitigating the insider threat while minimizing adverse impacts on site operations. Important principles include real-time monitoring of personnel and material and requiring that the physical protection and material control and accounting systems to be much more coordinated and integrated than in the past

  11. STAPHYLOCOCCUS AUREUS IN NURSING PROFESSIONALS AND THE MICROORGANISM’S SUSCEPTIBILITY PROFILE TO ANTIMICROBIALS

    Directory of Open Access Journals (Sweden)

    Letícia Pimenta Lopes

    2017-01-01

    Full Text Available Objetivo: identificar el estado del cargador y el perfil de susceptibilidad a los antibióticos de los Staphylococcus aureus aislados de la saliva y de la secreción nasal de los profesionales de enfermería. Método: estudio transversal, que utilizó muestras de saliva y secreción nasal, obtenidas de 100 profesionales de enfermería que asisten a personas con VIH/SIDA. Resultados: se identificó que 43,0% de los participantes presentaron muestras de saliva y/o secreción nasal positiva por Staphylococcus aureus . De las 74 muestras de secreción nasal con Staphylococcus aureus , 14,9% presentaron resistencia a la oxacilina; 91,9% a la penicilina; 44,6% a la eritromicina y 41,9% a la clindamicina. De las 12 muestras de saliva positivas, 16,7% fueron resistentes a la oxacilina; 100% a la penicilina; 33,4% a la eritromicina y 25,0% a la clindamicina. Conclusión: se cree que el profesional al obtener conocimiento de su estado de portador del microorganismos multi-resistentes, pasará a supervisar sus prácticas asistenciales y adoptar con mayor eficacia las medidas para la prevención y el control de la cadena epidemiológica de estas bacterias en el ambiente laboral.

  12. Whistleblower Protection

    Science.gov (United States)

    The Whistleblower Protection Enhancement Act of 2012 (WPA) and the Whistleblower Protection Act of 1989 Enhanced by the Act of 2012 provides protection rights for Federal employees against retaliation for whistleblowing activities.

  13. Environmental protection: Shifting the focus toward the protected object

    Directory of Open Access Journals (Sweden)

    Cvetić Radenka

    2013-01-01

    Full Text Available This article is an attempt to provide a comprehensive overview of the rationale which led to developments in the law of environmental protection in a direction of an even more efficient protection of environment from human beings. There has been a transformation of the constitutionally protected right to a healthy environment to the Constitutional guarantee which involves both duty and responsibility for its protection. There has also been a shift from declaratory protection toward enforceable prohibitions and orders. These transformations have occurred when the society faced, under dramatic circumstances, the situation which shows that failure to protect the common good could lead to catastrophic consequences. The system of environmental protection, which enables sustainable development, is based on the primacy of the precautionary principle which deals with prevention and reduction of probability of harm, as well as on the no fault liability of the polluter for the environmental harm even in the absence of the claim for damages. The efficacy of the environmental protection could be improved by raising the awareness of the preservation of environment. The understanding that the protection of environment amounts to a survival of a mankind could lead to creating rights for the environment as such.

  14. Veterans' homecomings

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Refslund

    2015-01-01

    provided the soldier by rank, function, and mission vanishes and translates into an imperative ontological question about possible veteran subjectivity. In this article I argue that the veterans’ struggle to create postdeployment, postmilitary social identities entails profound secrecy work where past...... experiences, present conditions, and future ambitions are embedded in webs of concealment, disclosure, exposure, deception, lying, silence, and so forth, only partially controlled by the veterans themselves. The intricacies and anxieties associated with secrecy work are discussed in relation to three veteran...

  15. From tax evasion to tax planning

    OpenAIRE

    Bourgain, Arnaud; Pieretti, Patrice; Zanaj, Skerdilajda

    2013-01-01

    The aim of this paper is to analyze within a simple model how a re- moval of bank secrecy can impact tax revenues and banks' profitability assuming that offshore centers are able to offer sophisticated but legal or not easily detectable tax planning. Two alternative regimes are considered. A first in which there is strict bank secrecy and a second where there is international information exchange for tax purposes. We show in particular that sharing tax information with onshore coun- tries can...

  16. A solar regenerative thermoelectrochemical converter (RTEC)

    Energy Technology Data Exchange (ETDEWEB)

    Townsend, C.W.; McHardy, J. (Hughes Aircraft Co., El Segundo, CA (United States))

    1992-02-01

    This is an executive summary of a final subcontract report that describes the successful completion of a closed-loop demonstration of a regenerative thermoelectromechanical device using solar heat input for the production of electricity. The full report, which contains a detailed description of the two-year effort, is currently subject to a government secrecy order which precludes public release of the information. Copies of the full report will be made available for general release whenever the secrecy order is lifted.

  17. A solar regenerative thermoelectrochemical converter (RTEC). Executive summary of final subcontract report

    Energy Technology Data Exchange (ETDEWEB)

    Townsend, C.W.; McHardy, J. [Hughes Aircraft Co., El Segundo, CA (United States)

    1992-02-01

    This is an executive summary of a final subcontract report that describes the successful completion of a closed-loop demonstration of a regenerative thermoelectromechanical device using solar heat input for the production of electricity. The full report, which contains a detailed description of the two-year effort, is currently subject to a government secrecy order which precludes public release of the information. Copies of the full report will be made available for general release whenever the secrecy order is lifted.

  18. Radiation protection - Revision of French radiation protection regulations (1988)

    International Nuclear Information System (INIS)

    Mayoux, J.C.

    1989-01-01

    This article analyses the recent amendments to the 1966 and 1975 Decrees on general radiation protection principles and radiation protection of workers in large nuclear installations respectively and also describes national radiation protection law. In particular, the amendments incorporate the revised EURATOM basic radiation protection standards and the new international units (sievert and becquerel replace rem and curie) in the Decrees. (NEA) [fr

  19. Focus radiation protection

    International Nuclear Information System (INIS)

    Ebermann, Lutz

    2016-01-01

    The publication of the Bundesamt fuer Strahlenschutz on radiation protection covers the following issues: (i) exposure from natural sources: health hazard due to radon, radiation protection in residential homes, radon in Germany, natural raw materials in industrial processes; (ii) clearance of radioactive wastes: clearance in the frame of nuclear power plant dismantling, the situation in Germany and Europe; (iii) emergency management: principles of radiation protection, fictive sequence of accident events; (iiii) other actual radiation protection topics: more limits - more protection? radiation protection in medicine, occupational radiation protection.

  20. Protecting the Amazon with protected areas

    Science.gov (United States)

    Walker, Robert; Moore, Nathan J.; Arima, Eugenio; Perz, Stephen; Simmons, Cynthia; Caldas, Marcellus; Vergara, Dante; Bohrer, Claudio

    2009-01-01

    This article addresses climate-tipping points in the Amazon Basin resulting from deforestation. It applies a regional climate model to assess whether the system of protected areas in Brazil is able to avoid such tipping points, with massive conversion to semiarid vegetation, particularly along the south and southeastern margins of the basin. The regional climate model produces spatially distributed annual rainfall under a variety of external forcing conditions, assuming that all land outside protected areas is deforested. It translates these results into dry season impacts on resident ecosystems and shows that Amazonian dry ecosystems in the southern and southeastern basin do not desiccate appreciably and that extensive areas experience an increase in precipitation. Nor do the moist forests dry out to an excessive amount. Evidently, Brazilian environmental policy has created a sustainable core of protected areas in the Amazon that buffers against potential climate-tipping points and protects the drier ecosystems of the basin. Thus, all efforts should be made to manage them effectively. PMID:19549819

  1. Combined group ECC protection and subgroup parity protection

    Science.gov (United States)

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  2. Protective relay

    International Nuclear Information System (INIS)

    Lim, Mu Ji; Jung, Hae Sang

    1974-10-01

    This book is divided into two chapters, which deals with protective relay. The first chapter deals with the basic knowledge of relay on development of relay, classification of protective relay, rating of protective relay general structure of protective relay, detecting of ground protection, about point of contact, operating relay and trip relaying. The second chapter is about structure and explanation of relay on classification by structure such as motor type and moving-coil type, explanation of other relays over current relay, over voltage relay, short voltage relay, relay for power, relay for direction, test of over voltage relay, test of short voltage relay and test of directional circuit relay.

  3. To protect or not to protect: examining reasons for sun protection among young women at risk for skin cancer.

    Science.gov (United States)

    Auerbach, M V; Heckman, C J; Darlow, S

    2018-03-27

    We aimed to further the understanding of the low rates of sun protection in young women at risk for skin cancer. Six-hundred-sixty-one daily diary entries were received via text message over 14 days from 56 young women at moderate to high risk of developing skin cancer. Women reported whether or not they used sun protection and also listed what their reasons were for using protection or not using sun protection each day. Multi-level modeling was used to examine the influence of study variables when predicting daily sun protection or lack of protection. The number of days in which sun protection was reported was positively associated with "habit" and "prevention" as reasons for protection and negatively associated with "not-needed" and "unprepared" as reasons for non-protection. Self-reported sun protection increased over the 14-day study period. Results of this study suggest the potential value of interventions aimed at motives for sun-protection behaviors.

  4. On Secure Underlay MIMO Cognitive Radio Networks with Energy Harvesting and Transmit Antenna Selection

    KAUST Repository

    Lei, Hongjiang

    2017-03-20

    In this paper, we consider an underlay multipleinput- multiple-output (MIMO) cognitive radio network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an eavesdropper, where the secondary transmitter is powered by the renewable energy harvested from the primary transmitter in order to improve both energy efficiency and spectral efficiency. Based on whether the channel state information (CSI) of wiretap links are available or not, the secrecy outage performance of the optimal antenna selection (OAS) scheme and suboptimal antenna selection (SAS) scheme for underlay MIMO CRN with energy harvesting are investigated and compared with traditional space-time transmission scheme. The closed-form expressions for exact and asymptotic secrecy outage probability are derived. Monte-Carlo simulations are conducted to testify the accuracy of the analytical results. The analysis illustrates that OAS scheme outperforms SAS scheme. Furthermore, the asymptotic result shows that no matter which scheme is considered, the OAS and SAS schemes can achieve the same secrecy diversity order.

  5. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Ansari, Imran Shafique; Pan, Gaofeng; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  6. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang

    2017-08-09

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  7. Doctor-patient confidentiality - right and duty of a doctor in law regulations

    Directory of Open Access Journals (Sweden)

    Janusz Jaroszyński

    2018-03-01

    Full Text Available Physician’s professional secrecy is one of the most important duties of a doctor and should be provided with confidentiality regarding his or her health. Generally speaking, there is no legal definition of "physician’s professional secrecy" in Poland, although this concept already appears in the oath of Hippocrates: ‘I will keep secret anything I see or hear professionally which ought not to be told’. The issue of medical confidentiality (physician’s professional secrecy has been regulated in several legal acts such as: The Patient Rights and Patients Ombudsman Act, The Constitution of the Republic of Poland, The Medical Profession Act, The Civil Code Act, The Criminal Code Act and Code of Medical Ethics which is not considered as a legal act. The patient has the right to require confidentiality of the information concerning him and the obligation to keep medical confidentiality will apply to every representative of the medical profession, who obtained certain information by various professional activities.

  8. A CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet

    Science.gov (United States)

    2004-09-01

    revolutionary that VentureGames’ competition is determined to get a copy of it; 26 additionally the gamer community has gotten wind of the NG game and...to provide access to and protect are the NG Game Code, Employee Files, E -MAIL, Marketing Plans and Legacy Code. The NG Game Code is the MOST...major hit. E -MAIL is classified NON- SENSITIVE. The Marketing Plans are for the NG Game Code. They contain information concerning what the new

  9. Field selection of chemical protective clothing and respiratory protection

    International Nuclear Information System (INIS)

    Pinette, S.; Dodgen, C.; Morley, M.

    1991-01-01

    Safety professionals who must choose appropriate personal protective equipment for hazardous substance response or hazardous waste sites require useable information about the effectiveness of the various products available. Each hazardous waste operation involves a unique combination of chemical hazards requiring a unique combination of protective apparel. A chemical protective suit or respirator must be chosen for each site and each operation on the site. No single protective suit is effective against all chemical hazards. No single respirator is the best choice in every situation. Various sources of information on the effectiveness of protective clothing products will be discussed. Site-specific permeation testing of the proposed protective clothing options will also be discussed. It is both possible and practical to obtain specific information about the degree of protection afforded by a particular suit against a particular chemical mixture. It is also important to know how long the suit will last. Choosing adequate respiratory protection is a complex process. Respirator cartridge performance depends on various environmental factors as well as upon the combination and concentration of chemicals in the air. Once characterization of the air at a site has been accomplished, it may be appropriate to select an alternative to airline respirators and SCBAs. Respirator cartridges can be tested against specific chemical mixtures using worse case environmental factors. The results can be used to predict both the effectiveness and duration of protection afforded by respirator cartridges which can reduce costs and worker fatigue

  10. Safety of persons protected by the Government Protection Bureau

    Directory of Open Access Journals (Sweden)

    Wojciech Lis

    2015-12-01

    Full Text Available The state is the organizational structure, which unites the whole nation by providing optimal conditions for the functioning and development. One of the conditions for the basic functions of the state is efficient administration headed by a person with the role of management. They not only hold the highest position, but also represent the authority of the state. For this reason, they need special protection. Each attack undermines the authority of the administration and trust in the state institutions. For the protection of persons performing managerial functions in the state corresponds to the Government Protection Bureau that providing them protection at the same time protect the state.

  11. Protected area certificates: gaining ground for better ecosystem protection?

    Science.gov (United States)

    Segerstedt, Anna; Grote, Ulrike

    2015-06-01

    Protected areas are vital to sustain a number of ecosystem services. Yet, many protected areas are underfinanced and lack management effectiveness. Protected area certificates have been suggested as a way to resolve these problems. This instrument would allow land managers to certify an area if it meets certain conservation criteria. The certificates could then be sold on an international market, for example to companies and any consumers that are interested in environmental protection. Some pilot initiatives have been launched, yet little is known about future demand and features of protected area certificates. To fill this knowledge gap, we conduct a choice experiment with close to 400 long-distance tourists from Germany as a potential group of buyers. Our results indicate that the respondents have the highest willingness to pay for certificates that conserve sensitive ecosystems and in addition to this lead to poverty reduction and safeguard water resources. For other attributes such as a greenhouse gas reduction, the preferences are less significant. Overall, the results are rather homogenous irrespective of where the protected areas are located. These insights are important for the future design and marketing of protected area certificates.

  12. Loft fire protection

    International Nuclear Information System (INIS)

    White, E.R.; Jensen, J.D.

    1980-01-01

    Quantified criteria that was developed and applied to provide in-depth fire protection for the Loss of Fluid Test (LOFT) Facility are presented. The presentation describes the evolution process that elevated the facility's fire protection from minimal to that required for a highly protected risk or improved risk. Explored are some infrequently used fire protection measures that are poorly understood outside the fire protection profession

  13. Philosophy of radiological protection and radiation hazard protection law

    International Nuclear Information System (INIS)

    Kai, Michiaki; Kawano, Takao

    2013-01-01

    The radiation protection and the human safety in radiation facilities are strictly controlled by law. There are rules on the radiation measurement, too. In the present review, philosophy of the radiological protection and the radiation hazard protection law is outlined with reference to ICRP recommendations. (J.P.N.)

  14. The Physical Burdens of Secrecy

    Science.gov (United States)

    Slepian, Michael L.; Masicampo, E. J.; Toosi, Negin R.; Ambady, Nalini

    2012-01-01

    The present work examined whether secrets are experienced as physical burdens, thereby influencing perception and action. Four studies examined the behavior of people who harbored important secrets, such as secrets concerning infidelity and sexual orientation. People who recalled, were preoccupied with, or suppressed an important secret estimated…

  15. Information booklet on personal protective equipment: arm and hand protection

    International Nuclear Information System (INIS)

    1992-01-01

    Fire, heat, cold, electro-magnetic and ionising radiation, electricity, chemicals, impacts, cuts, abrasion, etc. are the common hazards for arms and hands at work. The gloves chosen for protection of the arm and hand should cover those parts adequately and the material of the gloves should be capable of offering protection against the specific hazard involved. Criteria for choosing arm and hand protection equipment will be based on their shape and part of the arm and hand protected. Guide lines for choosing such personal protection equipment for nuclear facilities are given. (M.K.V.). 3 annexures, 1 appendix

  16. Niveles de GLP-1 tras el test de sobrecarga oral de glucosa en mujeres con antecedentes de diabetes mellitus gestacional

    OpenAIRE

    Maraver Selfa, Silvia María

    2017-01-01

    Se ha descrito una reducción significativa del efecto incretina en pacientes con DM2 que puede deberse a la secreción alterada de las hormonas incretinas y/o a una acción insulinotrópica defectuosa de las mismas. Podría plantearse que este efecto incretina deteriorado en pacientes con trastornos del metabolismo hidrocarbonado, fuese un defecto primario precoz que preceda al desarrollo de la DM2, o secundario a la propia hiperglucemia. Objetivos. Estudiar el patrón de secreción de GLP-1 ...

  17. Efecto de la ingesta de cereales enriquecidos con triptófano sobre el sueño, melatonina, serotonina, cortisol y estado antioxidante en personas mayores

    OpenAIRE

    Matito Celaya, Sergio

    2015-01-01

    Teniendo en cuenta el concepto de Crononutrición y la secreción de melatonina, serotonina, cortisol durante el día y la noche, nuestro objetivo ha sido analizar como el consumo de cereales enriquecidos con triptófano, precursor de Serotonina y Melatonina, puede ayudar a la reestructuración del ciclo sueño / vigilia, como actúa sobre la secreción de Cortisol matutino y como la Melatonina ayuda a la excreción de radicales libres en orina por su capacidad antioxidante. Para objetivar como afec...

  18. ¿Cambio de paradigma desde el bypass gástrico Roux-en-Y al (mini) bypass gástrico debido a problemas de glucosa?

    OpenAIRE

    Himpens, Jaques

    2014-01-01

    El bypass gástrico Roux-en-Y funciona de la siguiente manera sobre la diabetes mellitus tipo 2: En obesos mórbidos la diabetes tipo2 inicia con la presencia de resistencia a la insulina con un incremento del péptido C, o sea incremento de las necesidades de insulina que los no obesos tienen para mantener el estado euglucemico. Cuando la secreción de insulina es insuficiente, se desarrolla la diabetes. Esta secreción de insulina está modulada por las incretinas y posiblemente por anti-incretin...

  19. Information booklet on personal protective equipment: eye and face protection

    International Nuclear Information System (INIS)

    1992-01-01

    In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix

  20. Protection of industrial and business secrets in environmental protection law

    International Nuclear Information System (INIS)

    Breuer, R.

    1986-01-01

    The author investigates the relation between environmental protection and data protection, especially concerning the protection of industrial and business secrets. For this kind of conflict there are only general administrative and procedural provisions with little systematic order. Special provisions of data protection covering all aspects of industrial and business secrets, as for example in social or tax law, do not exist in German law until now. (WG) [de

  1. Numerical differential protection

    CERN Document Server

    Ziegler, Gerhard

    2012-01-01

    Differential protection is a fast and selective method of protection against short-circuits. It is applied in many variants for electrical machines, trans?formers, busbars, and electric lines.Initially this book covers the theory and fundamentals of analog and numerical differential protection. Current transformers are treated in detail including transient behaviour, impact on protection performance, and practical dimensioning. An extended chapter is dedicated to signal transmission for line protection, in particular, modern digital communication and GPS timing.The emphasis is then pla

  2. Personal protective equipment

    International Nuclear Information System (INIS)

    2004-01-01

    This Practical Radiation Technical Manual is one of a series that has been designed to provide guidance on radiological protection for employers, radiation protection officers, managers and other technically competent persons who have responsibility for ensuring the safety of employees working with ionizing radiation. The Manual may be used with the appropriate IAEA Practical Radiation Safety Manuals to provide training, instruction and information for all employees engaged in work with ionizing radiation. Personal protective equipment (PPE) includes clothing or other special equipment that is issued to individual workers to provide protection against actual or potential exposure to ionizing radiations. It is used to protect each worker against the prevailing risk of external or internal exposure in circumstances in which it is not reasonably practicable to provide complete protection by means of engineering controls or administrative methods. Adequate personal protection depends on PPE being correctly selected, fitted and maintained. Appropriate training for the users and arrangements to monitor usage are also necessary to ensure that PPE provides the intended degree of protection effectively. This Manual explains the principal types of PPE, including protective clothing and respiratory protective equipment (RPE). Examples of working procedures are also described to indicate how PPE should be used within a safe system of work. The Manual will be of most benefit if it forms part of a more comprehensive training programme or is supplemented by the advice of a qualified expert in radiation protection. Some of the RPE described in this Manual should be used under the guidance of a qualified expert

  3. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  4. Numerical distance protection

    CERN Document Server

    Ziegler, Gerhard

    2011-01-01

    Distance protection provides the basis for network protection in transmission systems and meshed distribution systems. This book covers the fundamentals of distance protection and the special features of numerical technology. The emphasis is placed on the application of numerical distance relays in distribution and transmission systems.This book is aimed at students and engineers who wish to familiarise themselves with the subject of power system protection, as well as the experienced user, entering the area of numerical distance protection. Furthermore it serves as a reference guide for s

  5. Machine Protection

    CERN Document Server

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an ...

  6. Concepts of radiation protection

    International Nuclear Information System (INIS)

    2013-01-01

    This seventh chapter presents the concepts and principles of safety and radiation protection, emergency situations; NORM and TENORM; radiation protection care; radiation protection plan; activities of the radiation protection service; practical rules of radiation protection and the radiation symbol

  7. FORMACIÓN DE PORO EN MEMBRANA CELULAR POR MEDIO DE LA PEQUEÑA GLICOPROTEÍNA DE SECRECIÓN DEL VIRUS DE EBOLA ZAIRE

    Directory of Open Access Journals (Sweden)

    Nury EsperanzaVargas-Alejo

    2004-12-01

    Full Text Available Uno de los patógenos capaces de inducir fiebres hemorrágicas es el virus de Ebola, clasificado en la familia filoviridae con cuatro subtipos, de los cuales el más analizado es el subtipo de Ebola Zaire, identificando en su genoma siete proteínas estructurales y una de secreción denominada pequeña glicoproteína de secreción del virus de Ebola Zaire.Utilizando las herramientas de bioinformática y los diferentes estudios realizados al virus de Ebola Zaire a escala estructural y funcional, se logró predecir la estructura terciaria de su pequeña glicoproteína de secreción (SSGP EBO-Z. Basados en esta estructura se generó un posible modelo del mecanismo de entrada del virus de Ebola Zaire a la célula huésped, donde juegan un papel importante los receptores y ligandos de la membrana celular; permitiendo a la vez explicar los daños patológicos encontrados en los pacientes.

  8. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1975-01-01

    Physical and radiological terms, quantities, and units. Basic principles of radiation protection (ICRP, IAEA, EURATOM, FRG). Biological effects of ionizing radiation. Objectives of practical radiation protection. (HP) [de

  9. Machine Protection

    International Nuclear Information System (INIS)

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an interlock system providing the glue between these systems. The most recent accelerator, the LHC, will operate with about 3 × 10 14 protons per beam, corresponding to an energy stored in each beam of 360 MJ. This energy can cause massive damage to accelerator equipment in case of uncontrolled beam loss, and a single accident damaging vital parts of the accelerator could interrupt operation for years. This article provides an overview of the requirements for protection of accelerator equipment and introduces the various protection systems. Examples are mainly from LHC, SNS and ESS

  10. Radiation protection principles

    International Nuclear Information System (INIS)

    Ismail Bahari

    2007-01-01

    The presentation outlines the aspects of radiation protection principles. It discussed the following subjects; radiation hazards and risk, the objectives of radiation protection, three principles of the system - justification of practice, optimization of protection and safety, dose limit

  11. Ozone Layer Protection

    Science.gov (United States)

    ... and Research Centers Contact Us Share Ozone Layer Protection The stratospheric ozone layer is Earth’s “sunscreen” – protecting ... GreenChill Partnership Responsible Appliance Disposal (RAD) Program Ozone Protection vs. Ozone Pollution This website addresses stratospheric ozone ...

  12. Ergodic secret message capacity of the wiretap channel with finite-rate feedback

    KAUST Repository

    Rezki, Zouheir

    2014-06-01

    We study the secret message capacity of an ergodic block fading wiretap channel with partial channel state information at the transmitter and perfect channel state information at the receivers, under both a short term power constraint (STPC) and a long term power constraint (LTPC). We consider that in addition to the statistics of the main and the eavesdropper channel state information (CSI), the sender is provided by the legitimate receiver with a q-bit feedback, at the beginning of each coherence block, through an error-free public channel, with capacity q bits. We establish upper and lower bounds on the secrecy capacity. We show that the lower and the upper bounds coincide asymptotically as q → ∞. When applied to Rayleigh fading channels, we show that, a 4-bit feedback achieves about 90% of the secrecy capacity when perfect main CSI is available at the transmitter. Finally, asymptotic analysis at high and low Signal-to-Noise Ratio (SNR) is presented. It is found that the capacity is bounded at high-SNR, whereas at asymptotically low-SNR, the lower bounds and the upper bound scale linearly with SNR under STPC. Furthermore, subject to LTPC, the capacity at low-SNR is equal to the capacity of the main channel without secrecy constraint and with perfect CSI at both the transmitter and the receiver, under a mild condition on the fading statistics. We also show that a positive secrecy rate is achievable even when the feedback is at the end of each coherence block and q=1. © 2002-2012 IEEE.

  13. Ergodic secret message capacity of the wiretap channel with finite-rate feedback

    KAUST Repository

    Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2014-01-01

    We study the secret message capacity of an ergodic block fading wiretap channel with partial channel state information at the transmitter and perfect channel state information at the receivers, under both a short term power constraint (STPC) and a long term power constraint (LTPC). We consider that in addition to the statistics of the main and the eavesdropper channel state information (CSI), the sender is provided by the legitimate receiver with a q-bit feedback, at the beginning of each coherence block, through an error-free public channel, with capacity q bits. We establish upper and lower bounds on the secrecy capacity. We show that the lower and the upper bounds coincide asymptotically as q → ∞. When applied to Rayleigh fading channels, we show that, a 4-bit feedback achieves about 90% of the secrecy capacity when perfect main CSI is available at the transmitter. Finally, asymptotic analysis at high and low Signal-to-Noise Ratio (SNR) is presented. It is found that the capacity is bounded at high-SNR, whereas at asymptotically low-SNR, the lower bounds and the upper bound scale linearly with SNR under STPC. Furthermore, subject to LTPC, the capacity at low-SNR is equal to the capacity of the main channel without secrecy constraint and with perfect CSI at both the transmitter and the receiver, under a mild condition on the fading statistics. We also show that a positive secrecy rate is achievable even when the feedback is at the end of each coherence block and q=1. © 2002-2012 IEEE.

  14. Radiological protection

    International Nuclear Information System (INIS)

    Azorin N, J.; Azorin V, J. C.

    2010-01-01

    This work is directed to all those people related with the exercise of the radiological protection and has the purpose of providing them a base of knowledge in this discipline so that they can make decisions documented on technical and scientist factors for the protection of the personnel occupationally exposed, the people in general and the environment during the work with ionizing radiations. Before de lack of a text on this matter, this work seeks to cover the specific necessities of our country, providing a solid presentation of the radiological protection, included the bases of the radiations physics, the detection and radiation dosimetry, the radiobiology, the normative and operational procedures associates, the radioactive wastes, the emergencies and the transport of the radioactive material through the medical and industrial applications of the radiations, making emphasis in the relative particular aspects to the radiological protection in Mexico. The book have 16 chapters and with the purpose of supplementing the given information, are included at the end four appendixes: 1) the radioactive waste management in Mexico, 2-3) the Mexican official standards related with the radiological protection, 4) a terms glossary used in radiological protection. We hope this book will be of utility for those people that work in the investigation and the applications of the ionizing radiations. (Author)

  15. Machine protection systems

    CERN Document Server

    Macpherson, A L

    2010-01-01

    A summary of the Machine Protection System of the LHC is given, with particular attention given to the outstanding issues to be addressed, rather than the successes of the machine protection system from the 2009 run. In particular, the issues of Safe Machine Parameter system, collimation and beam cleaning, the beam dump system and abort gap cleaning, injection and dump protection, and the overall machine protection program for the upcoming run are summarised.

  16. Information protection playbook

    CERN Document Server

    Kane, Greg

    2013-01-01

    The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to

  17. Radiation Protection Ordinance. Preventive Radiation Protection Act. 3. rev. and enlarged ed.

    International Nuclear Information System (INIS)

    Kramer, R.; Zerlett, G.

    1990-01-01

    This 3rd edition presents the official explanations of the legislative intent behind the Radiation Protection Ordinance of 1976 and the 2nd amending ordinance, and the commentaries which as usual refer to the legal aspects and the related medical, scientific, and technical aspects. As a consequence of the reactor accident at Chernobyl, the existing radiation protection law has been extended by the Act for Preventive Measures for Pretection of the Population Against the Hazards of Ionizing Radiation (Preventive Radiation Protection Act), establishing preventive legal provisions and measures, so that this new edition has likewise been extended by commentaries on the Protective Radiation Protection Act and an introduction to the new area of law. The material also includes the Act for Establishment of a Federal Office for Radiation Protection, of October 9, 1989, which amended the Atomic Energy Act and the Preventive Radiation Protection Act. The correction of the Radiation Protection Ordinance of October 16, 1989 (BGBl. I p. 1926) has been incorporated into the text of the amended version of the Radiation Protection Ordinance. Court decisions and literature referred to cover material published up to the first months of 1989. (orig.) [de

  18. Susceptibility of modern relay protection: Will protection from cyber attacks help?

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2014-01-01

    Full Text Available Modern trends in relay protection (RP based on the substitution of electromechanical protection relays (EMPR by digital protective relays (DPR have resulted in the emergence of an absolutely new problem, which was not known before. This problem is the possibility of an intentional remote destructive impact (IRDI on relay protection in order to put it out of action or make it perform functions that have nothing to do with the current operational mode of protected electric equipment. Traditional and well-known methods ensuring information safety cannot fully prevent unauthorized actions of RP. The article describes a new way for the problem solution.

  19. The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime

    KAUST Repository

    Rezki, Zouheir

    2017-02-07

    We improve upon our previous upper bound on the secrecy capacity of the wiretap channel with multiple transmit antennas and single-antenna receivers, with noisy main channel state information (CSI) at the transmitter (CSI-T). Specifically, we show that if the main CSI error does not scale with the power budget at the transmitter P̅, then the secrecy capacity is )bounded above essentially by log log (P̅ yielding a secure degree of freedom (sdof) equal to zero. However, if the main CSI error scales as O(P̅-β), for β ∈ [0,1], then the sdof is equal to β.

  20. The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime

    KAUST Repository

    Rezki, Zouheir; Chaaban, Anas; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    We improve upon our previous upper bound on the secrecy capacity of the wiretap channel with multiple transmit antennas and single-antenna receivers, with noisy main channel state information (CSI) at the transmitter (CSI-T). Specifically, we show that if the main CSI error does not scale with the power budget at the transmitter P̅, then the secrecy capacity is )bounded above essentially by log log (P̅ yielding a secure degree of freedom (sdof) equal to zero. However, if the main CSI error scales as O(P̅-β), for β ∈ [0,1], then the sdof is equal to β.

  1. Contribution of somatostatin, cortistatin, their receptors and other peptides to the regulation of growth hormone in primates and mice

    OpenAIRE

    Córdoba-Chacón, José

    2011-01-01

    La regulación de la secreción de hormona del crecimiento (GH) se ha considerado clásicamente como resultado de la acción conjunta y coordinada de dos péptidos hipotalámicos: la hormona liberadora de GH (GHRH) y el factor inhibidor de la secreción de GH (somatostatina, SST). Sin embargo, actualmente el control de la GH se concibe más como un fenómeno multifactorial, en el que se combinan señales reguladoras adicionales, tanto de origen central, como la cortistatina (CST o CORT) y la ghrelina h...

  2. Efecto del grado de saturación de ácidos grasos en la dieta sobre diferentes actividades aminopeptidasas solubles y unidas a membrana en suero, tejido nervioso y otros tejidos periféricos

    OpenAIRE

    Segarra-Robles, Ana-Belén

    2013-01-01

    [ES]El nivel circulante o tisular de un determinado péptido, es el resultado de un equilibrio entre su secreción y degradación. Así, el estado funcional de estos péptidos bioactivos depende no sólo de su secreción sino también de su inactivación o procesamiento mediante la acción de enzima s proteolíticos tales como las aminopeptidasas (AP). Estos enzimas juegan un importante papel en la regulación del Sistema Renina Angiotensina (SRA), de las hormonas oxitocina y vasopresina y de la TRH. Es ...

  3. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  4. Strengthening the radiation protection culture: a priority of EDF radiation protection policy

    International Nuclear Information System (INIS)

    Garcier, Y.

    2006-01-01

    Full text of publication follows: In order to improve the management of radiation protection at EDF nuclear power plants, the Human Factors Group of the Research and Development Division of EDF has performed some studies on the appropriation process of the radiation protection requirements. These studies have notably shown that an efficient application of the radiation protection requirements lies on a comprehension by all workers of the meaning of these requirements. Furthermore, they should not be applied under the constraint or because of the fear of a sanction, but the workers need to perceive and understand the benefits in terms of protection associated with the radiation protection requirements. The strengthening of the radiation protection culture is therefore a key element of the radiation protection policy developed by EDF. This culture lies on an awareness of the health risks potentially associated with low levels of ionising radiations, as well as on the knowledge of tools, techniques and good practices developed to control the level of exposures and improve the radiation protection. Various type of actions have been undertaken to reinforce among the relevant players (exposed and non-exposed workers, contractors, all levels of management,... ) an awareness of radiation protection in order to integrate it in their day to day work: elaboration of a 'radiation protection system of reference' explaining how the radiation protection regulatory requirements are applied at EDF, publication of a 'radiation protection handbook' available for all workers (including contractors), training sessions, creation of networks of specialists from the various nuclear power plants on specific radiation protection issues, organisation of feed-back experience forum, etc. Beyond these specific actions, i t is also important to ensure a support and an assistance on the field by dedicated specialists. In this perspective, the health physicists have to play a key role in order to

  5. Factors Controlling Vegetation Fires in Protected and Non-Protected Areas of Myanmar

    Science.gov (United States)

    Biswas, Sumalika; Vadrevu, Krishna Prasad; Lwin, Zin Mar; Lasko, Kristofer; Justice, Christopher O.

    2015-01-01

    Fire is an important disturbance agent in Myanmar impacting several ecosystems. In this study, we quantify the factors impacting vegetation fires in protected and non-protected areas of Myanmar. Satellite datasets in conjunction with biophysical and anthropogenic factors were used in a spatial framework to map the causative factors of fires. Specifically, we used the frequency ratio method to assess the contribution of each causative factor to overall fire susceptibility at a 1km scale. Results suggested the mean fire density in non-protected areas was two times higher than the protected areas. Fire-land cover partition analysis suggested dominant fire occurrences in the savannas (protected areas) and woody savannas (non-protected areas). The five major fire causative factors in protected areas in descending order include population density, land cover, tree cover percent, travel time from nearest city and temperature. In contrast, the causative factors in non-protected areas were population density, tree cover percent, travel time from nearest city, temperature and elevation. The fire susceptibility analysis showed distinct spatial patterns with central Myanmar as a hot spot of vegetation fires. Results from propensity score matching suggested that forests within protected areas have 11% less fires than non-protected areas. Overall, our results identify important causative factors of fire useful to address broad scale fire risk concerns at a landscape scale in Myanmar. PMID:25909632

  6. Factors controlling vegetation fires in protected and non-protected areas of myanmar.

    Directory of Open Access Journals (Sweden)

    Sumalika Biswas

    Full Text Available Fire is an important disturbance agent in Myanmar impacting several ecosystems. In this study, we quantify the factors impacting vegetation fires in protected and non-protected areas of Myanmar. Satellite datasets in conjunction with biophysical and anthropogenic factors were used in a spatial framework to map the causative factors of fires. Specifically, we used the frequency ratio method to assess the contribution of each causative factor to overall fire susceptibility at a 1km scale. Results suggested the mean fire density in non-protected areas was two times higher than the protected areas. Fire-land cover partition analysis suggested dominant fire occurrences in the savannas (protected areas and woody savannas (non-protected areas. The five major fire causative factors in protected areas in descending order include population density, land cover, tree cover percent, travel time from nearest city and temperature. In contrast, the causative factors in non-protected areas were population density, tree cover percent, travel time from nearest city, temperature and elevation. The fire susceptibility analysis showed distinct spatial patterns with central Myanmar as a hot spot of vegetation fires. Results from propensity score matching suggested that forests within protected areas have 11% less fires than non-protected areas. Overall, our results identify important causative factors of fire useful to address broad scale fire risk concerns at a landscape scale in Myanmar.

  7. Factors controlling vegetation fires in protected and non-protected areas of myanmar.

    Science.gov (United States)

    Biswas, Sumalika; Vadrevu, Krishna Prasad; Lwin, Zin Mar; Lasko, Kristofer; Justice, Christopher O

    2015-01-01

    Fire is an important disturbance agent in Myanmar impacting several ecosystems. In this study, we quantify the factors impacting vegetation fires in protected and non-protected areas of Myanmar. Satellite datasets in conjunction with biophysical and anthropogenic factors were used in a spatial framework to map the causative factors of fires. Specifically, we used the frequency ratio method to assess the contribution of each causative factor to overall fire susceptibility at a 1km scale. Results suggested the mean fire density in non-protected areas was two times higher than the protected areas. Fire-land cover partition analysis suggested dominant fire occurrences in the savannas (protected areas) and woody savannas (non-protected areas). The five major fire causative factors in protected areas in descending order include population density, land cover, tree cover percent, travel time from nearest city and temperature. In contrast, the causative factors in non-protected areas were population density, tree cover percent, travel time from nearest city, temperature and elevation. The fire susceptibility analysis showed distinct spatial patterns with central Myanmar as a hot spot of vegetation fires. Results from propensity score matching suggested that forests within protected areas have 11% less fires than non-protected areas. Overall, our results identify important causative factors of fire useful to address broad scale fire risk concerns at a landscape scale in Myanmar.

  8. Radiation protection

    International Nuclear Information System (INIS)

    1989-01-01

    A NRPB leaflet in the 'At-a-Glance' series explains in a simple but scientifically accurate way what radiation is, the biological effects and the relative sensitivity of different parts of the human body. The leaflet then discusses radiation protection principles, radiation protection in the UK and finally the effectiveness of this radiation protection as judged by a breakdown of the total dose received by an average person in the UK, a heavy consumer of Cumbrian seafood, an average nuclear industry worker and an average person in Cornwall. (UK)

  9. Environmental protection

    International Nuclear Information System (INIS)

    Klinda, J.; Lieskovska, Z.

    1998-01-01

    In this chapter environmental protection in the Slovak Republic in 1997 are reviewed. The economics of environmental protection, state budget, Slovak state environmental fund, economic instruments, environmental laws, environmental impact assessment, environmental management systems, and environmental education are presented

  10. Complete rerouting protection

    DEFF Research Database (Denmark)

    Stidsen, Thomas K.; Kjærulff, Peter

    2006-01-01

    Protection of communication against network failures is becoming increasingly important and in this paper we present the most capacity efficient protection method possible, the complete rerouting protection method, when requiring that all communication should be restored in case of a single link...... network failure. We present a linear programming model of the protection method and a column generation algorithm. For 6 real world networks, the minimal restoration overbuild network capacity is between 13% and 78%. We further study the importance of the density of the network, derive analytical bounds...

  11. Innovative protection cookbook

    International Nuclear Information System (INIS)

    Lambert, D.L.

    2002-01-01

    Full text: A large portion of the international community relies on expert judgment and military expertise to form the protection strategy of weapons-grade nuclear materials. This approach can be less than effectual for two primary reasons. First, much of the nuclear material that needs the most protection is not in a static form and located in easily secured storage locations. Some of the most effective measures for protection of in-process material are administrative and procedural in nature. There are basic protection differences between countries just like there are differences in baking bread. However, the necessary steps to produce bread are basically the same around the world. Certain ingredients are required to give it flavor, make it rise, and have a certain texture. So it is in the development of protection systems. A measure of intrusion detection, some access controls and searches, a pinch of computerized accounting, a layer of delay barriers, and a smidgen of armed response--and the basis for a 'cookbook' is born. Any and all protection systems can begin with simple elements that can be just as effective as the most sophisticated modern components. This paper will describe some of those simple, but effective, innovative protection measures. (author)

  12. Radiation protection seminar

    International Nuclear Information System (INIS)

    2012-01-01

    The Radiation Protection Seminar, was organized by the Argentina Association of Biology and Nuclear Medicine, and Bacon Laboratory, the 20 june 2012, in the Buenos Aires city of Argentina. In this event were presented some papers on the following topics: methods of decontamination, radiation protection of patients; concepts of radiation protection and dosimetry.

  13. Resilience from coastal protection.

    Science.gov (United States)

    Ewing, Lesley C

    2015-10-28

    Coastal areas are important residential, commercial and industrial areas; but coastal hazards can pose significant threats to these areas. Shoreline/coastal protection elements, both built structures such as breakwaters, seawalls and revetments, as well as natural features such as beaches, reefs and wetlands, are regular features of a coastal community and are important for community safety and development. These protection structures provide a range of resilience to coastal communities. During and after disasters, they help to minimize damages and support recovery; during non-disaster times, the values from shoreline elements shift from the narrow focus on protection. Most coastal communities have limited land and resources and few can dedicate scarce resources solely for protection. Values from shore protection can and should expand to include environmental, economic and social/cultural values. This paper discusses the key aspects of shoreline protection that influence effective community resilience and protection from disasters. This paper also presents ways that the economic, environmental and social/cultural values of shore protection can be evaluated and quantified. It presents the Coastal Community Hazard Protection Resilience (CCHPR) Index for evaluating the resilience capacity to coastal communities from various protection schemes and demonstrates the use of this Index for an urban beach in San Francisco, CA, USA. © 2015 The Author(s).

  14. Experimental study of the Rapsodie protections; Etude experimentale des protections de rapsodie

    Energy Technology Data Exchange (ETDEWEB)

    Chapelet, M; Edeline, J; Lhiaubet, G [Commissariat a l' Energie Atomique, Fontenay-aux-Roses (France). Centre d' Etudes Nucleaires

    1968-07-01

    This report gives details of the protection tests which have been carried out by the Protection Sub-Commission during the starting-up trials on the reactor Rapsodie. The main types of tests reported concern the flux measurements in the core, the reflectors, the sodium and the near biological protections, the radio-protection measurements in the premises, and the activation of the principal fluids. In the last part, the results obtained are analyzed and compared to the forecast calculations. (author) [French] Ce rapport rend compte des essais de protection qui ont ete effectues dans le cadre des essais de demarrage de RAPSODIE par la Sous Commission Protection. Les principaux types d'essais rapportes sont les mesures de flux dans le coeur, les reflecteurs, le sodium et les protections biologiques proches, les mesures de radioprotection dans les locaux, et l'activation des principaux fluides. Dans la derniere partie, les resultats obtenus sont analyses et compares aux calculs previsionnels. (auteur)

  15. Protective interest rate as tax instrument of corporate capital protection

    Directory of Open Access Journals (Sweden)

    Vukašinović Jovan

    2015-01-01

    Full Text Available This paper deals with researching negative consequences of allocation of economic (virtual gains made as a result of conventional accounting concept by facing current income with historical expenses and necessity to promote additional stimulating instruments that are at disposal by the state in order to eliminate these negative consequences. one of them is certainly protective interest as a relatively new active fiscal instrument of capital protection and recognition of price of invested owner's equity in business ventures, i.e. a specific form of compensation by the state for invested capital bearing in mind, that no source is free, including ones own sources. We also showed mechanisms of protective interest which, together with other measures of macroeconomic policy, should contribute to the protection of real purchasing power of company equity and increase of net gain, left on company's disposal for new investments, new work places, more money in the budget, protection of actual assets against taxing in the conditions of inflation, etc.

  16. Radiation. Protection. Health. Proceedings

    International Nuclear Information System (INIS)

    Hajek, Michael; Maringer, Franz Josef; Steurer, Andreas; Schwaiger, Martina; Timal, Guenter

    2015-01-01

    The topics of the meeting are the diagnostic and therapeutic application of ionizing radiations, the application of radiation in research, industry and engineering and radiation protection. The volume includes the following chapters: Radiation protection and society, radiation protection infrastructure, population and environment, metrology and measuring techniques, 1. Workshop on population and environment, NORM and radon, 2. Update: dose - extent of damage - limiting value definition, radiation protection for personnel (except medicine), radiation protection in medicine.

  17. Protection from visible light by commonly used textiles is not predicted by ultraviolet protection.

    Science.gov (United States)

    Van den Keybus, Caroline; Laperre, Jan; Roelandts, Rik

    2006-01-01

    Interest is increasing in the prevention of acute and chronic actinic damage provided by clothing. This interest has focused mainly on protection against ultraviolet irradiation, but it has now also turned to protection against visible light. This change is mainly due to the action spectrum in the visible light range of some photodermatoses and the increasing interest in photodynamic therapy. The ultraviolet protection provided by commercially available textiles can be graded by determining an ultraviolet protection factor. Several methods have already been used to determine the ultraviolet protection factor. The fact that protection from visible light by textiles cannot be predicted by their ultraviolet protection makes the situation more complicated. This study attempts to determine whether or not the ultraviolet protection factor value of a particular textile is a good parameter for gauging its protection in the visible light range and concludes that a protection factor of textile materials against visible light needs to be developed. This development should go beyond the protection factor definition used in this article, which has some limitations, and should take into account the exact action spectrum for which the protection is needed.

  18. Radiation protection law

    International Nuclear Information System (INIS)

    Hebert, J.

    1981-01-01

    This article first reviews the general radiation protection law at international and national level, with particular reference to the recommendations of the International Commission on Radiological Protection (ICRP) which, although not mandatory, are nevertheless taken into consideration by international organisations establishing basic radiation protection standards such as the UN, IAEA, NEA and Euratom, at Community level, and by national legislation. These standards are therefore remarkably harmonized. Radiation protection rule applied in France for the different activities and uses of radioactive substances are then described, and finally, a description is given of the regulations governing artificial radioisotopes and radioactive effluents. (NEA) [fr

  19. Sun protection

    Science.gov (United States)

    ... sun exposure. The start of summer is when UV rays can cause the most skin damage. Use sun protection, even on cloudy days. Clouds and haze don't protect you from the sun. Avoid surfaces that reflect light, such as water, sand, concrete, snow, and areas ...

  20. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information. (a)(1... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights to request privacy protection for protected...

  1. Radiation protection

    International Nuclear Information System (INIS)

    Jain, Aman; Sharma, Shivam; Parasher, Abhishek

    2014-01-01

    Radiation dose measurement, field of radiobiology, is considered to be critical factor for optimizing radiation protection to the health care practitioners, patients and the public. This lead to equipment that has dose - area product meters permanently installed. In many countries and even institution, the range of equipment is vast and with the opportunity for radiation protection and dose recording varies considerably. Practitioners must move with the changed demands of radiation protection but in many cases without assistance of modern advancements in technology Keeping the three basic safety measures Time, Dose and Shielding we can say 'Optimum dose is safe dose' instead of 'No dose is safe dose'. The purpose enclosed within the title 'Radiation Protection'. The use of radiation is expanding widely everyday around the world and crossing boundaries of medical imaging, diagnostic and. The way to get the ''As low as reasonably achievable' is only achievable by using methodology of radiation protection and to bring the concern of general public and practitioners over the hazards of un-necessary radiation dose. Three basic principles of radiation protection are time, distance and shielding. By minimizing the exposure time increasing the distance and including the shielding we can reduce the optimum range of dose. The ability of shielding material to attenuate radiation is generally given as half value layer. This is the thickness of the material which will reduce the amount of radiation by 50%. Lab coat and gloves must be worn when handling radioactive material or when working in a labeled radiation work area. Safety glasses or other appropriate splash shields should be used when handling radioactive material. 1. Reached to low dose level to occupational workers, public as per prescribed dose limit. 2. By mean of ALARA principle we achieved the protection from radiation besides us using the radiation for our benefit

  2. Buffer moisture protection system

    International Nuclear Information System (INIS)

    Ritola, J.; Peura, J.

    2013-11-01

    With the present knowledge, bentonite blocks have to be protected from the air relative humidity and from any moisture leakages in the environment that might cause swelling of the bentonite blocks during the 'open' installation phase before backfilling. The purpose of this work was to design the structural reference solution both for the bottom of the deposition hole and for the buffer moisture protection and dewatering system with their integrated equipment needed in the deposition hole. This report describes the Posiva's reference solution for the buffer moisture protection system and the bottom plate on basis of the demands and functional requirements set by long-term safety. The reference solution with structural details has been developed in research work made 2010-2011. The structural solution of the moisture protection system has not yet been tested in practice. On the bottom of the deposition hole a copper plate which protects the lowest bentonite block from the gathered water is installed straight to machined and even rock surface. The moisture protection sheet made of EPDM rubber is attached to the copper plate with an inflatable seal. The upper part of the moisture protection sheet is fixed to the collar structures of the lid which protects the deposition hole in the disposal tunnel. The main function of the moisture protection sheet is to protect bentonite blocks from the leaking water and from the influence of the air humidity at their installation stage. The leaking water is controlled by the dewatering and alarm system which has been integrated into the moisture protection liner. (orig.)

  3. Study of a new X-ray protective apron with composite protective sheet

    International Nuclear Information System (INIS)

    Kanzaki, Ryuji; Ohtsuka, Akiyoshi; Okayama, Akio

    1997-01-01

    Lead powder and oxygenated lead are widely used as materials in conventional protective aprons. However, the use of lead alone limits weight reduction in an apron. Because the amount of lead can not be decreased without reducing X-ray absorption rate. In this study, we report the efficiency of a new X-ray protective apron with a composite protective sheet. The X-ray absorption rate of the composite sheet was 4.5 percent less than that of the lead sheet. However, the effective protective efficiency of the composite sheet was the same as that of the lead sheet. The uniformity of the new X-ray protective apron was good, and the differences among products were small. The new X-ray protective apron was about 30 percent lighter than a lead apron with a 0.25 mm lead equivalent. The new lighter aprons are more comfortable for the radiology staff. Therefore, the use of a composite protective apron provides the advantages of weight reduction and increased comfort without reducing X-ray absorption rate. (author)

  4. Training in radiation protection

    International Nuclear Information System (INIS)

    Schreiber, F.

    1998-01-01

    Persons who are exposed to ionizing radiation at their workplace have to be trained in radiation protection. According to the Radiation Protection Ordinance the person with responsibility in radiation protection has to guarantee that the training is performed twice a year. Our training material was created especially for the persons defined in the Radiation Protection Ordinance and the X-ray Ordinance. It enables persons who teach (generally the radiation protection officer) to perform the training without tedious study and preparation of the documents. Our material is not just another textbook for radiation protection but rather a folder with colour transparencies and explanatory texts which make a difference in volume and price in comparison to other existing materials. (orig.) [de

  5. Nature and landscape protection

    International Nuclear Information System (INIS)

    Klinda, J.; Lieskovska, Z.

    1998-01-01

    In accordance with National Council of the Slovak Republic Act N. 287/1994 Coll. on Nature and Landscape Protection, the system of complex nature landscape protection has been designed based on five levels of protection. Categories of protected areas as well as cultural monuments in the Slovak Republic are reviewed.Slovak contribution to the world heritage is included

  6. DOE groundwater protection strategy

    International Nuclear Information System (INIS)

    Lichtman, S.

    1988-01-01

    EH is developing a DOE-wide Groundwater Quality Protection Strategy to express DOE's commitment to the protection of groundwater quality at or near its facilities. This strategy responds to a September 1986 recommendation of the General Accounting Office. It builds on EPA's August 1984 Ground-Water Protection Strategy, which establishes a classification system designed to protect groundwater according to its value and vulnerability. The purposes of DOE's strategy are to highlight groundwater protection as part of current DOE programs and future Departmental planning, to guide DOE managers in developing site-specific groundwater protection practices where DOE has discretion, and to guide DOE's approach to negotiations with EPA/states where regulatory processes apply to groundwater protection at Departmental facilities. The strategy calls for the prevention of groundwater contamination and the cleanup of groundwater commensurate with its usefulness. It would require long-term groundwater protection with reliance on physical rather than institutional control methods. The strategy provides guidance on providing long-term protection of groundwater resources; standards for new remedial actions;guidance on establishing points of compliance; requirements for establishing classification review area; and general guidance on obtaining variances, where applicable, from regulatory requirements. It also outlines management tools to implement this strategy

  7. Theory of vibration protection

    CERN Document Server

    Karnovsky, Igor A

    2016-01-01

    This text is an advancement of the theory of vibration protection of mechanical systems with lumped and distributed parameters. The book offers various concepts and methods of solving vibration protection problems, discusses the advantages and disadvantages of different methods, and the fields of their effective applications. Fundamental approaches of vibration protection, which are considered in this book, are the passive, parametric and optimal active vibration protection. The passive vibration protection is based on vibration isolation, vibration damping and dynamic absorbers. Parametric vibration protection theory is based on the Shchipanov-Luzin invariance principle. Optimal active vibration protection theory is based on the Pontryagin principle and the Krein moment method. The book also contains special topics such as suppression of vibrations at the source of their occurrence and the harmful influence of vibrations on humans. Numerous examples, which illustrate the theoretical ideas of each chapter, ar...

  8. Fire Protection Program Manual

    Energy Technology Data Exchange (ETDEWEB)

    Sharry, J A

    2012-05-18

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  9. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  10. Environmental protection economically viable

    International Nuclear Information System (INIS)

    Dartsch, B.; Hildebrandt, T.

    1994-01-01

    The Environmental Technology Forum for Industry and Research (Utech) was held for the fifth time this year at the International Congress Centre in Berlin. The main themes of this year's Utech were additive environmental protection, production-integrated environmental protection, management and economic aspects of environmental protection, research and development in environmental protection as well as environmental information legislation. (orig.) [de

  11. Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols

    DEFF Research Database (Denmark)

    Jurik, Mads Johan

    with many candidates. Client/server trade-offs: 1) a system where vote size is within a constant of the minimal size, and 2) a system where a voter is protected even when voting from a hostile environment (i.e. a Trojan infested computer). Both of these improvements are achieved at the cost of some extra...... computations at the server side. A small scale election with perfect ballot secrecy (i.e. any group of persons only learns what follows directly from their votes and the final result) usable e.g. for board room election. A key escrow system, which allows an observer to decrypt any message sent using any public...... an order of group operations to using only , where is the number of signatures checked, and is the security parameter....

  12. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  13. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  14. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  15. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  16. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  17. MIMO Beamforming for Secure and Energy-Efficient Wireless Communication

    Science.gov (United States)

    Nghia, Nguyen T.; Tuan, Hoang D.; Duong, Trung Q.; Poor, H. Vincent

    2017-02-01

    Considering a multiple-user multiple-input multiple-output (MIMO) channel with an eavesdropper, this letter develops a beamformer design to optimize the energy efficiency in terms of secrecy bits per Joule under secrecy quality-of-service constraints. This is a very difficult design problem with no available exact solution techniques. A path-following procedure, which iteratively improves its feasible points by using a simple quadratic program of moderate dimension, is proposed. Under any fixed computational tolerance the procedure terminates after finitely many iterations, yielding at least a locally optimal solution. Simulation results show the superior performance of the obtained algorithm over other existing methods.

  18. Focus radiation protection; Schwerpunkt Strahlenschutz

    Energy Technology Data Exchange (ETDEWEB)

    Ebermann, Lutz (comp.)

    2016-07-01

    The publication of the Bundesamt fuer Strahlenschutz on radiation protection covers the following issues: (i) exposure from natural sources: health hazard due to radon, radiation protection in residential homes, radon in Germany, natural raw materials in industrial processes; (ii) clearance of radioactive wastes: clearance in the frame of nuclear power plant dismantling, the situation in Germany and Europe; (iii) emergency management: principles of radiation protection, fictive sequence of accident events; (iiii) other actual radiation protection topics: more limits - more protection? radiation protection in medicine, occupational radiation protection.

  19. Protection using telecommunications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    Deregulation in both the telecommunication and electric power industry, together with new telecommunication network technologies and advances in numerical protection, has resulted in the need to reconsider traditional methods of delivering tele-protection schemes and their associated bearer services. Fibre-optic technology is commonly deployed in new telecommunication networks for inter-station communication and utility-owned and public telecommunication networks from third parties are available for protection purposes. (author)

  20. Radiation protection in Sudan

    International Nuclear Information System (INIS)

    Elamin, O.I.; Hajmusa, E.A.; Shaddad, I.A.

    2001-01-01

    The regulatory framework as established by the Sudan Atomic Energy Commission (SAEC) Act, promulgated in 1996, is described in the report. Three levels of responsibility in meeting radiation protection requirements are established: the Board, the Radiation Protection Technical Committee as the competent authority in the field of radiation protection, and the SAEC Department of Radiation Protection and Environmental Monitoring as the implementing technical body. The report also refers to environmental activities, patient doses in diagnostic radiology, the management of disused sources, emergency preparedness and orphan sources, and the national training activities in the radiation protection field. (author)

  1. The architecture of the management system of complex steganographic information

    Science.gov (United States)

    Evsutin, O. O.; Meshcheryakov, R. V.; Kozlova, A. S.; Solovyev, T. M.

    2017-01-01

    The aim of the study is to create a wide area information system that allows one to control processes of generation, embedding, extraction, and detection of steganographic information. In this paper, the following problems are considered: the definition of the system scope and the development of its architecture. For creation of algorithmic maintenance of the system, classic methods of steganography are used to embed information. Methods of mathematical statistics and computational intelligence are used to identify the embedded information. The main result of the paper is the development of the architecture of the management system of complex steganographic information. The suggested architecture utilizes cloud technology in order to provide service using the web-service via the Internet. It is meant to provide streams of multimedia data processing that are streams with many sources of different types. The information system, built in accordance with the proposed architecture, will be used in the following areas: hidden transfer of documents protected by medical secrecy in telemedicine systems; copyright protection of online content in public networks; prevention of information leakage caused by insiders.

  2. Radiation Protection

    International Nuclear Information System (INIS)

    Loos, M.

    2002-01-01

    Major achievements of SCK-CEN's Radiation Protection Department in 2001 are described. The main areas for R and D of the department are enviromnental remediation, emergency planning, radiation protection research, low-level radioactvity measurements, safeguards and physics measurements, decision strategy research and policy support and social sciences in nuclear research. Main achievements for 2001 in these areas are reported

  3. Laser Protection TIL

    Data.gov (United States)

    Federal Laboratory Consortium — The Laser Protection TIL conducts research and analysis of laser protection materials along with integration schemes. The lab's objectives are to limit energy coming...

  4. Perspectives for environmental radiation protection in EU radiation protection legislation

    International Nuclear Information System (INIS)

    Janssens, A.

    2000-01-01

    The basis of EU radiation protection legislation is the EURATOM Trealy. It is discussed whether the Treaty offers a legal basis for the protection of the natural environment. The incorporation of provisions pertaining to the nuclear fuel cycle or to radioactive substances in general environmental legislation is explained, as well as the possible implications of international conventions subscribed by the European Union. The European Commission is in the process of developing an overall approach to risk analysis for the protection of health, consumer interests, and the environment. It is examined to what extent the consideration of the impact of radiation on the natural environment fits in the overall framework and whether the principles underlying classical radiation protection are applicable to biota. Specific attention is given to situations where high levels of environmental radioactivity would require intervention. (Author)

  5. FPGA-Based Plant Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae [KEPCO E and C, Daejeon (Korea, Republic of)

    2011-08-15

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system.

  6. FPGA-Based Plant Protection System

    International Nuclear Information System (INIS)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae

    2011-01-01

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system

  7. Protection of Levees against Beavers

    Science.gov (United States)

    Kozłowski, Wojciech; Balawejder, Adam

    2017-10-01

    Beavers are a protected species, so the levees must be properly protected so as not to harm the beavers and protect the levees from the destruction caused by these animals. This protection requires the use of bentonite mats as shaft seals, and wire mesh. Recently, such new protection structures began to be used successfully.

  8. International Responses to Human Protection Crises: Responsibility to Protect and the Emerging Protection Regime*

    OpenAIRE

    Bellamy, Alex J.

    2015-01-01

    This essay examines contemporary debates about human protection by the UN Security Council and others in response to major humanitarian crises. It argues that there are clear signs of an emerging international human protection regime in the evolving practice of the Security Council and suggests that this regime is based on an accommodation between different moral accounts of humanitarian intervention. The first section examines some of the legal and moral debates that have arisen with respect...

  9. Tritium protective clothing

    International Nuclear Information System (INIS)

    Fuller, T.P.; Easterly, C.E.

    1979-06-01

    Occupational exposures to radiation from tritium received at present nuclear facilities and potential exposures at future fusion reactor facilities demonstrate the need for improved protective clothing. Important areas relating to increased protection factors of tritium protective ventilation suits are discussed. These areas include permeation processes of tritium through materials, various tests of film permeability, selection and availability of suit materials, suit designs, and administrative procedures. The phenomenological nature of film permeability calls for more standardized and universal test methods, which would increase the amount of directly useful information on impermeable materials. Improvements in suit designs could be expedited and better communicated to the health physics community by centralizing devlopmental equipment, manpower, and expertise in the field of tritium protection to one or two authoritative institutions

  10. Tritium protective clothing

    Energy Technology Data Exchange (ETDEWEB)

    Fuller, T. P.; Easterly, C. E.

    1979-06-01

    Occupational exposures to radiation from tritium received at present nuclear facilities and potential exposures at future fusion reactor facilities demonstrate the need for improved protective clothing. Important areas relating to increased protection factors of tritium protective ventilation suits are discussed. These areas include permeation processes of tritium through materials, various tests of film permeability, selection and availability of suit materials, suit designs, and administrative procedures. The phenomenological nature of film permeability calls for more standardized and universal test methods, which would increase the amount of directly useful information on impermeable materials. Improvements in suit designs could be expedited and better communicated to the health physics community by centralizing devlopmental equipment, manpower, and expertise in the field of tritium protection to one or two authoritative institutions.

  11. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  12. Machine Protection

    International Nuclear Information System (INIS)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012

  13. Machine Protection

    Energy Technology Data Exchange (ETDEWEB)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  14. Machine Protection

    CERN Document Server

    Zerlauth, Markus; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  15. Neutron protection material and neutron protection devices made of such material

    International Nuclear Information System (INIS)

    Ries, W.

    1984-01-01

    This is concerned with a neutron protection material made of thermoplastic or thermosetting plastic from high molecule hydrocarbon compounds with particularly high hydrogen and carbon contents as braking or shielding material (moderator) for fast neutrons. The plastic can contain boron for absorbing low energy neutrons. The material is used to manufacture foil, plates, pipes, shielding walls, components, bodies for radiation protection equipment, devices and plant and for neutron protection clothes. (orig./HP) [de

  16. Radiation protection standards

    International Nuclear Information System (INIS)

    Koelzer, W.

    1980-01-01

    The present paper deals with: Objectives and basic concepts of radiation protection, basic radiobiological considerations, the ICRP system of dose limitation and with operational radiation protection (limits, reference levels, occupational exposure). (RW)

  17. Radiation protection, 1975. Annual EPA review of radiation protection activities

    International Nuclear Information System (INIS)

    1976-06-01

    The EPA, under its Federal Guidance authorities, is responsible for advising the President on all matters pertaining to radiation and, through this mechanism, to provide guidance to other Federal agencies on radiation protection matters. Highlights are presented of significant radiation protection activities of all Federal agencies which were completed in 1975, or in which noteworthy progress was made during that period, and those events affecting members of the public. State or local activities are also presented where the effects of those events may be more far-reaching. At the Federal level significant strides have been made in reducing unnecessary radiation exposure through the efforts of the responsible agencies. These efforts have resulted in the promulgation of certain standards, criteria and guides. Improved control technologies in many areas make it feasible to reduce emissions at a reasonable cost to levels below current standards and guides. This report provides information on the significant activities leading to the establishment of the necessary controls for protection of public health and the environment. Radiation protection activities have been undertaken in other areas such as medical, occupational and consumer product radiation. In the context of radiation protection, ancillary activities are included in this report in order to present a comprehensive overview of the events that took place in 1975 that could have an effect on public health, either directly or indirectly. Reports of routine or continuing radiation protection operations may be found in publications of the sponsoring Federal agencies, as can more detailed information about activities reported in this document. A list of some of these reports is included

  18. Measuring protected-area isolation and correlations of isolation with land-use intensity and protection status.

    Science.gov (United States)

    Seiferling, Ian S; Proulx, Raphaël; Peres-Neto, Pedro R; Fahrig, Lenore; Messier, Christian

    2012-08-01

    Protected areas cover over 12% of the terrestrial surface of Earth, and yet many fail to protect species and ecological processes as originally envisioned. Results of recent studies suggest that a critical reason for this failure is an increasing contrast between the protected lands and the surrounding matrix of often highly altered land cover. We measured the isolation of 114 protected areas distributed worldwide by comparing vegetation-cover heterogeneity inside protected areas with heterogeneity outside the protected areas. We quantified heterogeneity as the contagion of greenness on the basis of NDVI (normalized difference vegetation index) values, for which a higher value of contagion indicates less heterogeneous land cover. We then measured isolation as the difference between mean contagion inside the protected area and mean contagion in 3 buffer areas of increasing distance from the protected-area border. The isolation of protected areas was significantly positive in 110 of the 114 areas, indicating that vegetation cover was consistently more heterogeneous 10-20 km outside protected areas than inside their borders. Unlike previous researchers, we found that protected areas in which low levels of human activity are allowed were more isolated than areas in which high levels are allowed. Our method is a novel way to assess the isolation of protected areas in different environmental contexts and regions. ©2011 Society for Conservation Biology.

  19. The Radiation Protection Act

    International Nuclear Information System (INIS)

    Persson, L.

    1989-01-01

    The new Radiation Protection Act (1988:220) entered into force in Sweden on July 1st, 1988. This book presents the Act as well as certain regulations connected to it. As previously, the main responsibility for public radiation protection will rest with one central radiation protection authority. According to the 1988 Act, the general obligations with regard to radiation protection will place a greater responsibility than in the past on persons carrying out activities involving radiation. Under the act, it is possible to adjust the licensing and supervisory procedures to the level of danger of the radiation source and the need for adequate competence, etc. The Act recognises standardised approval procedures combined with technical regulations for areas where the risks are well known. The Act contains several rules providing for more effective supervision. The supervising authority may in particular decide on the necessary regulations and prohibitions for each individual case. The possibilities of using penal provisions have been extended and a rule on the mandatory execution of orders has been introduced. The Ordinance on Radiation Protection (1988:293) designates the National Institute of Radiation Protection (SSI) as the central authority referred to in the Radiation Protection Act. The book also gives a historic review of radiation protection laws in Sweden, lists regulations issued by SSI and presents explanations of radiation effects and international norms in the area. (author)

  20. Power system protection

    International Nuclear Information System (INIS)

    Venkata, S.S.; Damborg, M.J.; Jampala, A.K.

    1991-01-01

    Power systems of the 21st century will be more modern, and complex, utilizing the latest available technologies. At the same time, generating plants will have to operate with minimal spinning margins and energy transportation has to take place at critical levels due to environmental and economical constraints. These factors dictate that the power systems be protected with optimum sensitivity, selectivity and time of operation to assure maximum reliability, and security at minimal cost. With an increasing role played by digital computers in every aspect of protection, it is important to take a critical and fresh look at the art and science of relaying and protection. The main objective of this paper is to review the past, present and future of power system protection from a software point of view

  1. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1976-01-01

    The lecture is divided into five sections. The introduction deals with the physical and radiological terms, quantities and units. Then the basic principles of radiological protection are discussed. In the third section attention is paid to the biological effects of ionizing radiation. The fourth section deals with the objectives of practical radiological protection. Finally the emergency measures are discussed to be taken in radiation accidents. (HP) [de

  2. Environmental protection

    International Nuclear Information System (INIS)

    Martinez, A.S.

    1987-01-01

    The question of environment protection related to the use of nuclear energy aiming to power generation, based on the harmonic concept of economic and industrial development, preserving the environment, is discussed. A brief study of environmental impacts for some energy sources, including nuclear energy, to present the systems of a nuclear power plant which aim at environmental protection, is done. (M.C.K.) [pt

  3. XXX. Days of Radiation Protection. Conference Proceedings of the 30-th Days of Radiation Protection

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-11-15

    The publication has been set up as a proceedings of the conference dealing with health protection during work with ionizing radiation for different activities which involve the handling of ionizing radiation sources. The main conference topics are focused on current problems in radiation protection and radioecology. In this proceedings totally 107 papers are published. The Conference consists of following sections: Effects of ionizing radiation; Regulation of radiation protection; Dosimetry and Metrology of ionizing radiation; Radiation protection in nuclear Power plants; Medical exposure and radiation protection in diagnostic radiology, nuclear medicine and radiation oncology; Natural radioactivity issues in radiation protection; Education, societal aspects and public involvement in radiation protection, trends and perspectives.

  4. XXX. Days of Radiation Protection. Conference Proceedings of the 30-th Days of Radiation Protection

    International Nuclear Information System (INIS)

    2008-11-01

    The publication has been set up as a proceedings of the conference dealing with health protection during work with ionizing radiation for different activities which involve the handling of ionizing radiation sources. The main conference topics are focused on current problems in radiation protection and radioecology. In this proceedings totally 107 papers are published. The Conference consists of following sections: Effects of ionizing radiation; Regulation of radiation protection; Dosimetry and Metrology of ionizing radiation; Radiation protection in nuclear Power plants; Medical exposure and radiation protection in diagnostic radiology, nuclear medicine and radiation oncology; Natural radioactivity issues in radiation protection; Education, societal aspects and public involvement in radiation protection, trends and perspectives

  5. Investor Protections and Economic Growth

    OpenAIRE

    Haidar, Jamal Ibrahim

    2009-01-01

    Using objective measures of investor protections in 170 countries, I establish that the level of investor protection matters for cross-country differences in GDP growth: countries with stronger protections tend to grow faster than those with poor investor protections.

  6. Protecting plutonium: physical safeguards

    International Nuclear Information System (INIS)

    Ney, J.F.

    1975-10-01

    In the development of physical protection systems, objectives for improving overall performance include the following: (1) Increase the time required for the malefactor to achieve his goal; (2) decrease the time required for detection of malevolent activities; (3) reduce the time for adequate response force arrival; (4) increase the capability to neutralize the malefactor; (5) reduce the total protection system costs, while increasing the level of protection; (6) improve acceptance levels (social, environmental, legal, and institutional); and (7) increase nuclear fuel cycle safety. Fortunately, there is sufficient lead time and technical base to explore and develop new protection system concepts so that a completely integrated and tested protection system capable of providing unprecedented levels of security can be available when needed. Although it will be impossible to completely eliminate all risks, it should be both possible and economically feasible to install protection systems which will deter or prevent a malefactor from using the nuclear fuel cycle to disrupt society

  7. Systematic approach in protection and ergonomics testing personal protective equipment

    NARCIS (Netherlands)

    Hartog. E.A. den

    2009-01-01

    In the area of personal protection against chemical and biological (CB) agents there is a strong focus on testing the materials against the relevant threats. The testing programs in this area are elaborate and are aimed to guarantee that the material protects according to specifications. This

  8. Radiological protection survey results about radiodiagnosis protection practices in Cuba

    International Nuclear Information System (INIS)

    Jova S, L.; Morales M, J.A.; Quevedo, J.R.; Medina, J.R.; Naranjo, A.M.; Fornet, O.M.

    1996-01-01

    In order to identify radiation protection current situation in national X-ray diagnostic practice , the State (cuban) Supervision System for Radiation and Nuclear Safety carried out in 1992 a survey which was planned for projection of future regulatory activities in this field. Survey covers the most important aspects related to radiation protection of occupationally exposed workers, patients and general population. Surveyed sample included a total of 52 X-ray units, sited in 7 dental clinics, 2 polyclinics and 13 hospitals, from 7 provinces of the country. Results showed that the organization of radiation protection in terms of personnel specially designated to carry out surveillance and control activities and level of documentation is deficient. Survey evidenced the general lack of safety and quality culture among technologists and radiologists which is mainly reflected in non regular application of basic patient protection measures (shielding, collimation, use of proper filtration among others) and non regular execution of basic quality inspection of employed radiographic systems. (authors). 4 refs., 1 fig

  9. Radiological Protection Act 1970

    International Nuclear Information System (INIS)

    1970-01-01

    This Act provides for the establishment of a Radiological Protection Board to undertake research and advise on protection from radiation hazards. Its functions include provision of advice to Government departments with responsibilities in relation to protection of sectors of the community or the community as a whole against the hazards of ionizing radiation. The Act, which lays down that the Board shall replace certain departments concerned with radiation protection, repeals several Sections of the Radioactive Substances Act 1948 and the Science and Technology Act 1965. (NEA) [fr

  10. Protection, interlocks and diagnostics

    CERN Document Server

    Griffiths, S A; White, C; Theed, J E

    2006-01-01

    When designing any power converter it is essential to assess and incorporate adequate protection. The main objective is to offer a solution which is safe, reliable and repairable and that achieves its specification within budget. The level of protection found within each converter varies widely and will depend on the topology employed, its application and rating. This document is a guide to the types of protection engineers should consider mainly when designing power converters, as protection added during construction or after installation will always be expensive.

  11. Observations on physical protection methods for protecting against unauthorized acts by an insider

    International Nuclear Information System (INIS)

    Ericson, D.M.; Goldman, L.A.; Lobner, R.R.

    1983-01-01

    Two basic approaches have evolved over the past several years for physical protection against sabotage by insiders. One, area-type physical protection, involves the use of access controls at area boundaries. Current practices at nuclear power plants generally fall into this category. The second, component-level physical protection, involves hardware at individual components as well as access controls at the boundary. The area-type physical protection concepts include team, area, and operational zoning. Team zoning requires the formation of multiperson teams that must be used to gain access to vital areas. Area zoning divides the plant into two or more zones, each of which is operated and maintained by separate, dedicated teams. Operational zoning is a closed-loop access control system that permits an initial vital area access, but blocks access to certain other vital areas until the operability of equipment in the first area is verified by test or inspection. Component-level physical protection is also a closed-loop system in which both area and component access are monitored. Each of the above measures can provide effective protection against an insider in certain instances, but each has weaknesses that must be recognized. An approach for protection against the insider is to take the most promising features of each of the above physical protection measures and supplement these capabilities with damage control and design changes as appropriate for a particular plant

  12. The national radiation protection infrastructure

    International Nuclear Information System (INIS)

    Mastauskas, A.

    1999-01-01

    The state system of radiation protection is still being created after Lithuania regained its independancy and in connection with recommendations laid in the ICRP-60 publication and requirements of legislation of European Community. A new regulation institutions was established and a number of laws and regulations related to radiation protection was prepared. The Radiation Protection Centre of Ministry of Health is the regulatory authority responsible for radiation protection of public and of workers using sources of ionizing radiation in Lithuania. A new Radiation Protection Law, Nuclear Energy Law, Radioactive Waste Management Law and different regulations was approved. Preparation of legislation, creation of state system of radiation protection and its upgrading allow to presume that the necessary level of radiation protection is to be achieved. (au)

  13. Ethical issues in radiation protection

    International Nuclear Information System (INIS)

    Persson, Lars

    2000-03-01

    Ethical theories are relevant to the current recommendations and standards for radiation protection. Radiation protection is not only a matter for science. It is also a problem of philosophy. In order for protection regulations to be respected, it must correspond to widely accepted ethical values among those who are affected by the regulations. The workshop covered the following issues: Problems in Present Protection Policy, ICRP Protection Policy - A Historical Perspective, Radiation Risk - What we know and what we believe, Present ICRP Recommendations, Ethical Values in the Context of ICRP Recommendations, Collective Responsibility for Invisible Harm, Environmental Protection - Ethical Issues, The Global Change of Values, and Procedural justice and Radiation Protection. Six workshop contributions and a workshop summary are presented in this report

  14. Ethical issues in radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Persson, Lars (ed.)

    2000-03-15

    Ethical theories are relevant to the current recommendations and standards for radiation protection. Radiation protection is not only a matter for science. It is also a problem of philosophy. In order for protection regulations to be respected, it must correspond to widely accepted ethical values among those who are affected by the regulations. The workshop covered the following issues: Problems in Present Protection Policy, ICRP Protection Policy - A Historical Perspective, Radiation Risk - What we know and what we believe, Present ICRP Recommendations, Ethical Values in the Context of ICRP Recommendations, Collective Responsibility for Invisible Harm, Environmental Protection - Ethical Issues, The Global Change of Values, and Procedural justice and Radiation Protection. Six workshop contributions and a workshop summary are presented in this report.

  15. Special protective concretes

    International Nuclear Information System (INIS)

    Bouniol, P.

    2001-01-01

    Concrete is the most convenient material when large-scale radiation protection is needed. Thus, special concretes for nuclear purposes are used in various facilities like reactors, reprocessing centers, storage sites, accelerators, hospitals with nuclear medicine equipment, food ionization centers etc.. The recent advances made in civil engineering for the improvement of concrete durability and compactness are for a large part transposable to protection concretes. This article presents the basic knowledge about protection concretes with the associated typological and technological aspects. A large part is devoted to the intrinsic properties of concretes and to their behaviour in irradiation and temperature conditions: 1 - definition and field of application of special protective concretes; 2 - evolution of concepts and technologies (durability of structures, techniques of formulation, new additives, market evolution); 3 - design of protective structures (preliminary study, radiation characteristics, thermal constraints, damping and dimensioning, mechanical criteria); 4 - formulation of special concretes (general principles, granulates, hydraulic binders, pulverulent additives, water/cement ratio, reference composition of some special concretes); 5 - properties of special concretes (damping and thermo-mechanical properties); 6 - induced-irradiation and temperature phenomena (activation, radiolysis, mineralogical transformations, drying, shrinking, creep, corrosion of reinforcement). (J.S.)

  16. Protective Behavior in Games

    NARCIS (Netherlands)

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as

  17. Radiation protective clothing

    International Nuclear Information System (INIS)

    Fujinuma, Tadashi; Tamura, Shoji; Ijiri, Yasuo.

    1988-01-01

    Purpose: To obtain radiation protective clothings of excellent workability and durability. Constitution: Protective clothings of the present invention comprise shielding materials for the upper-half of the body having lead foils laminated on one surface and shielding materials for the lower-half of the body a resin sheet containing inorganic powders of high specific gravity. Such protective clothings have a frexibility capable of followings after the movement of the upper-half body and easily follow after the movement such as acute bending of the body near the waste in the lower-half body. (Kamimura, M.)

  18. Healthy Watersheds Protection

    Science.gov (United States)

    ... for restoring areas with degraded water quality, as well as protecting healthy waters from emerging problems before expensive damages occur. ... exclusively on restoring impaired waters, EPA created the Healthy ... more emphasis to proactively protecting high quality waters, following the ...

  19. FIRE PROTECTION SYSTEMS AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Aristov Denis Ivanovich

    2016-03-01

    Full Text Available The All-Russian Congress “Fire Stop Moscow” was de-voted to the analysis of the four segments of the industry of fire protection systems and technologies: the design of fire protec-tion systems, the latest developments and technologies of active and passive fire protection of buildings, the state and the devel-opment of the legal framework, the practice of fire protection of buildings and structures. The forum brought together the repre-sentatives of the industry of fire protection systems, scientists, leading experts, specialists in fire protection and representatives of construction companies from different regions of Russia. In parallel with the Congress Industrial Exhibition of fire protection systems, materials and technology was held, where manufacturers presented their products. The urgency of the “Fire Stop Moscow” Congress in 2015 organized by the Congress Bureau ODF Events lies primarily in the fact that it considered the full range of issues related to the fire protection of building and construction projects; studied the state of the regulatory framework for fire safety and efficiency of public services, research centers, private companies and busi-nesses in the area of fire safety. The main practical significance of the event which was widely covered in the media space, was the opportunity to share the views and information between management, science, and practice of business on implementing fire protection systems in the conditions of modern economic relations and market realities. : congress, fire protection, systems, technologies, fire protection systems, exhibition

  20. VIP protection from CBRN hazards

    International Nuclear Information System (INIS)

    Kaszeta, D.

    2009-01-01

    Protection of heads of state/government from CBRN threats requires flexibility and advanced planning. The best approach to CBRN countermeasures in a close protection context combine traditional close protection techniques, sound security practices, and a good understanding of the technical nature of the threat. Poor general security practices make for poor CBRN protection. This paper addresses a methodology for assessing the viability of threats to protected persons/VIPs and provides an overview of close protection in the CBRN environment. It is important to define the scope of CBRN response in the close protection context. Some threat agents are more applicable to a military environment than to the type of attack consistent with assassination. By focussing the scope of CBRN close protection more specifically on the more technically viable threats, appropriate concepts of operation can be developed. Concepts of operation, developed with an understanding of the threat, determine the requirement for advanced preparation and the training and equipping of protective details. Most of the responses required in CBRN incidents are well served by tactically sound close protection procedures. The fundamental principles are: rapid identification of hazard, speed, use of protective technology, and medical interventions, including rapid decontamination and basic and advanced life support measures. This paper does not contain confidential or classified information and represents only the opinion of its author. It does not represent any official policy or opinion of the authors present or previous employers.(author)

  1. Wake Shield Target Protection

    International Nuclear Information System (INIS)

    Valmianski, Emanuil I.; Petzoldt, Ronald W.; Alexander, Neil B.

    2003-01-01

    The heat flux from both gas convection and chamber radiation on a direct drive target must be limited to avoid target damage from excessive D-T temperature increase. One of the possibilities of protecting the target is a wake shield flying in front of the target. A shield will also reduce drag force on the target, thereby facilitating target tracking and position prediction. A Direct Simulation Monte Carlo (DSMC) code was used to calculate convection heat loads as boundary conditions input into ANSYS thermal calculations. These were used for studying the quality of target protection depending on various shapes of shields, target-shield distance, and protective properties of the shield moving relative to the target. The results show that the shield can reduce the convective heat flux by a factor of 2 to 5 depending on pressure, temperature, and velocity. The protective effect of a shield moving relative to the target is greater than the protective properties of a fixed shield. However, the protective effect of a shield moving under the drag force is not sufficient for bringing the heat load on the target down to the necessary limit. Some other ways of diminishing heat flux using a protective shield are discussed

  2. Optimization in radiological protection

    International Nuclear Information System (INIS)

    Acosta Perez, Clarice de Freitas

    1996-01-01

    The optimization concept in radiation protection is, in its essence, practical. In each aspect that we deal with the man, it is necessary to take frequent decisions such as: what is the protection level to be pursued, since the protection levels under consideration provide doses lower than the appropriate annual limits. The optimization gives a basic framework of the minding that is appropriate to conduct to a balance kind of the resources available for the protection and protection level obtained against a multitude of factors and constrains in a manner to obtain the best result. In this work, was performed the optimization, from the radiation protection point of view, of a facility project who enclose two shielded hot cells where will be handled UO 2 small plate with 50% of U-235 burn-up, irradiated in the research swimming pool reactor, IEA-R1. To obtain this goal were specified the relevant factors and criteria, were applied the main techniques used in a decision-making in radiological protection, presently adopted and was performed a sensibility study of the factors and criteria used in this work. In order to obtain a greater agility in applying the techniques for decision-making was developed a micro computer program. (author)

  3. Sun protection counseling by pediatricians has little effect on parent and child sun protection behavior.

    Science.gov (United States)

    Cohen, Liza; Brown, Judith; Haukness, Heather; Walsh, Lori; Robinson, June K

    2013-02-01

    To compare counseling concerning sun protection and outdoor exercise with the parent's report of the behavior of a child aged 9-16 years old. Structured interviews of medical personnel in 3 Chicago area practices elicited information about counseling methods and recommendations. In each practice, a convenience sample of parents completed a self-reported survey of their and their child's behavior. Sun protection counseling occurred more frequently than exercise counseling in all practices (P = .014). Sun protection counseling was associated with parental prompting (P = .004), performing a summer camp physical (P = .002), and the child having a sunburn (P = .003). After controlling for the child's age, sex, and skin tone, sun protection counseling was not associated with the child's use of sun protection. In multivariate analysis of the child's sun protection behavior, parental sunburns, indoor tanning in the last 12 months, perception of skin cancer risk, and sun protection self-efficacy were significant (P = .02). Children who pursued outdoor sports were twice as likely to use inadequate sun protection and sustain sunburns (CI 1.3-1.7). The child's sun protection behavior was influenced by parental sun protection, parental perception of skin cancer risk, and parental sun protection self-efficacy; therefore, sun protection for children needs to be aimed at parents as well as children. Communication with parents in a way that incorporates the principles of motivational interviewing may be more effective in promoting behavioral change than admonitions to use sunscreen. Copyright © 2013 Mosby, Inc. All rights reserved.

  4. The Chymistry of "The Learned Dr Plot" (1640-96).

    Science.gov (United States)

    Roos, Anna Marie

    2014-01-01

    In the seventeenth century, there were developing norms of openness in the presentation of scientific knowledge that were at odds with traditions of secrecy among chymists, particularly practitioners of chrysopoeia, or the transmutation of metals. This chapter analyzes how Dr. Robert Plot, the first professor of chymistry at Oxford, negotiated these boundaries within an institutional context. I first delineate his chymical and experimental practice, which incorporated procedures from medieval alchemical sources, particularly the Lullian corpus, as well as more novel practices from seventeenth-century chymistry. Then, I analyze how personal and institutional ambitions and economic considerations shaped to what extent Plot negotiated the boundaries between secrecy and the public dissemination of chymical knowledge.

  5. Social and cognitive factors associated with children’s secret-keeping for a parent

    Science.gov (United States)

    Gordon, Heidi M.; Lyon, Thomas D.; Lee, Kang

    2014-01-01

    This study examined children’s secret-keeping for a parent and its relationship to trust, theory of mind, secrecy endorsement, and executive functioning (EF). Children (N = 107) between 4 and 12 years of age participated in a procedure wherein parents broke a toy and asked children to promise secrecy. Responses to open-ended and direct questions were examined. Overall, secret-keeping increased with age and promising to keep the secret was related to fewer disclosures in open-ended questioning. Children who kept the secret in direct questioning exhibited greater trust and better parental ratings of EF than children who disclosed the secret. Findings highlight the importance of both social and cognitive factors in secret-keeping development. PMID:25291258

  6. Optimisation of radiation protection

    International Nuclear Information System (INIS)

    1988-01-01

    Optimisation of radiation protection is one of the key elements in the current radiation protection philosophy. The present system of dose limitation was issued in 1977 by the International Commission on Radiological Protection (ICRP) and includes, in addition to the requirements of justification of practices and limitation of individual doses, the requirement that all exposures be kept as low as is reasonably achievable, taking social and economic factors into account. This last principle is usually referred to as optimisation of radiation protection, or the ALARA principle. The NEA Committee on Radiation Protection and Public Health (CRPPH) organised an ad hoc meeting, in liaison with the NEA committees on the safety of nuclear installations and radioactive waste management. Separate abstracts were prepared for individual papers presented at the meeting

  7. Protective Behavior in Games

    OpenAIRE

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as a refinement tool.

  8. Protected urban planet

    NARCIS (Netherlands)

    Pereira Roders, A.R.; Veldpaus, L.; Verbruggen, R.C.

    2012-01-01

    PUP, abbreviation to Protected Urban Planet, is the first tool developed for visualizing, mapping and contributing to information exchange on the evolution of protected urban areas worldwide. Besides locating them, it also provides communities with means to disseminate and raise awareness for their

  9. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2005-01-01

    "Secret" or "closed door" sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  10. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2004-01-01

    Secret or closed door sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  11. Protecting the Library and Its Resources. A Guide to Physical Protection and Insurance.

    Science.gov (United States)

    Johnson, Edward M., Ed.

    The first part of this manual contains information about providing physical protection for libraries and is organized into the following chapters--(1) types of physical losses, (2) the prevention of losses, (3) fire defense measures, (4) fire protection equipment, and (5) fire protection in library planning. The second part is concerned with…

  12. On the ergodic secret message capacity of the wiretap channel with finite-rate feedback

    KAUST Repository

    Rezki, Zouheir

    2012-07-01

    We study the secret message capacity of an ergodic block fading wiretap channel with partial channel state information at the transmitter and perfect channel state information at the receivers. We consider that in addition to the statistics of the main and the eavesdropper channel state information (CSI), the sender is provided by the legitimate receiver with a q-bit feedback, at the beginning of each coherence block, through an error-free feedback channel, with capacity q bits. We establish upper and lower bounds on the secrecy capacity. We show that a positive secrecy rate is achievable even when the feedback is at the end of each coherence block and q = 1. We also show that the lower and the upper bounds coincide asymptotically as q → ∞. Finally, asymptotic analysis at high Signal-to-Noise Ratio (SNR) are presented where it is found that the capacity is bounded at high-SNR and present a simple suboptimal scalar quantizer that is capacity achieving, without the need of any numerical optimization, as q → ∞. When applied to Rayleigh fading channels, we show that, at high-SNR, a 4-bit feedback achieves 90% of the secrecy capacity when perfect main CSI is available at the transmitter. © 2012 IEEE.

  13. Enhancing Physical Layer Security of Multiuser SIMO Mixed RF/FSO Relay Networks with Multi-Eavesdroppers

    KAUST Repository

    El-Malek, Ahmed H. Abd

    2017-02-09

    In this paper, we investigate the secrecy performance of multiuser (MU) single-input multiple-output (SIMO) mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling and multiple eavesdropping attacks. The considered system includes multiple users, one amplify-and-froward (AF) relay, one destination and multiple eavesdroppers. The users are connected with a multi-antenna relay through RF links and the relay is connected with the destination through an FSO link. Maximal ratio combining (MRC) scheme is used at the relay node to combine the received signals at its different antennas. The RF/FSO channels are assumed to follow Nakagami-m/Gamma-Gamma fading models with considering the effect of pointing errors. In particular, we derive closed- form expressions for the exact and asymptotic outage probabilities. The asymptotic outage results are then used to obtain the optimal RF transmission power based on the dominant link between the RF and FSO links. Then, the considered system secrecy performance is investigated in the presence of multi- eavesdroppers where exact closed-form expression for the intercept probability is derived. Finally, a cooperative jamming model is proposed along with power allocation to enhance the system secrecy performance. Monte-Carlo simulations are provided to validate the achieved exact and asymptotic results.

  14. On the ergodic secret message capacity of the wiretap channel with finite-rate feedback

    KAUST Repository

    Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2012-01-01

    We study the secret message capacity of an ergodic block fading wiretap channel with partial channel state information at the transmitter and perfect channel state information at the receivers. We consider that in addition to the statistics of the main and the eavesdropper channel state information (CSI), the sender is provided by the legitimate receiver with a q-bit feedback, at the beginning of each coherence block, through an error-free feedback channel, with capacity q bits. We establish upper and lower bounds on the secrecy capacity. We show that a positive secrecy rate is achievable even when the feedback is at the end of each coherence block and q = 1. We also show that the lower and the upper bounds coincide asymptotically as q → ∞. Finally, asymptotic analysis at high Signal-to-Noise Ratio (SNR) are presented where it is found that the capacity is bounded at high-SNR and present a simple suboptimal scalar quantizer that is capacity achieving, without the need of any numerical optimization, as q → ∞. When applied to Rayleigh fading channels, we show that, at high-SNR, a 4-bit feedback achieves 90% of the secrecy capacity when perfect main CSI is available at the transmitter. © 2012 IEEE.

  15. Techniques in cerebral protection.

    Science.gov (United States)

    Fanelli, Fabrizio; Bezzi, Mario; Boatta, Emanuele; Passariello, Roberto

    2006-10-01

    Carotid angioplasty and stenting is a valid alternative option to conventional carotid endarterectomy in the treatment of carotid artery stenosis. During the stenting process, however, distal embolization can occur with neurological consequences. To avoid this, cerebral protection devices have been introduced. Three principal types of protection system have been developed: distal balloon occlusion, distal filters and proximal protection with or without reversal of flow. As protection devices became the focus of interest by manufactures and physicians, several trials are going on worldwide to analyze the characteristics of each of them and to evaluate their efficacy to reduce the rate of distal embolization.

  16. BGS Radon Protective Measures GIS

    International Nuclear Information System (INIS)

    Appleton, D.; Adlam, K.

    2000-01-01

    The British Geological Survey Radon Protective Measures Geographical Information System is described. The following issues are highlighted: Identification of development sites where radon protection is required in new dwellings; Mapping radon potential on the basis of house radon and geology; Radon Protective Measures GIS; Radon site reports; and Follow-up radon protective measures sire reports

  17. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    Directory of Open Access Journals (Sweden)

    Buha Danilo

    2016-01-01

    Full Text Available The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B" are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according to which the calculations are done are described. Criteria used to provide the protection to fulfill the backup protection role in the event of malfunction of the main protection of the transmission system. are clarified. The calculation of all protection functions (32 functions of generator B1 were performed in the project "Coordination of relay protection blocks B1 and B2 with the system of excitation and power system protections -TENT B".

  18. Practical radiation protection

    International Nuclear Information System (INIS)

    Brouwer, G.; Van den Eijnde, J.H.G.M.

    1997-01-01

    This textbook aims at providing sufficient knowledge and insight to carry out correctly radiation protection activities and operations. The subjects are appropriate for the training of radiation protection experts for the levels 5A (encapsulated sources, X rays) and 5B (open sources, laboratory activities)

  19. Selective protection. Selektivschutz

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    TC 2, ''Transmission and distribution of electrical energy'', held its meeting on selective protection on 16/17 March 1983 at Nuremberg. The main reason for the development of computerized protective systems is their ability to solve a wide range of tasks using only a few, high-integrated systems, i.e. on the software side instead of the hardware side. At the meeting, experts from industrial companies and public utilities reviewed the status and trends of protective systems engineering. Scientific studies and operating experience were presented. Separate abstracts were prepared for 2 papers in this conference proceedings volume.

  20. German mires - Utilisation and protection

    International Nuclear Information System (INIS)

    Roderfeld, H.

    1996-01-01

    Mires in Germany are mainly used for agriculture. Peat mining is important regionally, but forest utilisation less so. Twenty years ago in the former West Germany, the first steps from peatland utilisation to peatland protection were taken. Bog protection programmes were developed first. Nowadays research directed to fen protection has begun, prompted by the decreasing importance of agriculture in Central Europe and an increasing environmental awareness. The situation regarding mire protection in Germany is presented for each Federal State individually. A rough estimate suggests 45 000 ha of protected bogs and 25 000 ha of protected fens. These areas include natural and semi-natural mires as well as rewetted mires. (30 refs.)

  1. More strictly protected areas are not necessarily more protective: evidence from Bolivia, Costa Rica, Indonesia, and Thailand

    International Nuclear Information System (INIS)

    Ferraro, Paul J; Hanauer, Merlin M; Miteva, Daniela A; Pattanayak, Subhrendu K; Canavire-Bacarreza, Gustavo Javier; Sims, Katharine R E

    2013-01-01

    National parks and other protected areas are at the forefront of global efforts to protect biodiversity and ecosystem services. However, not all protection is equal. Some areas are assigned strict legal protection that permits few extractive human uses. Other protected area designations permit a wider range of uses. Whether strictly protected areas are more effective in achieving environmental objectives is an empirical question: although strictly protected areas legally permit less anthropogenic disturbance, the social conflicts associated with assigning strict protection may lead politicians to assign strict protection to less-threatened areas and may lead citizens or enforcement agents to ignore the strict legal restrictions. We contrast the impacts of strictly and less strictly protected areas in four countries using IUCN designations to measure de jure strictness, data on deforestation to measure outcomes, and a quasi-experimental design to estimate impacts. On average, stricter protection reduced deforestation rates more than less strict protection, but the additional impact was not always large and sometimes arose because of where stricter protection was assigned rather than regulatory strictness per se. We also show that, in protected area studies contrasting y management regimes, there are y 2 policy-relevant impacts, rather than only y, as earlier studies have implied. (letter)

  2. Principles of Radiation Protection Concepts

    International Nuclear Information System (INIS)

    Abd Aziz Mhd Ramli

    2004-01-01

    The contents of this chapter are follows - Radiation Protection Concepts: justification, dose limitation, optimisation, potential exposures, situation requiring intervention; Special Considerations. Protection from Radiation Hazards, Remove the Hazard, Prevent the Hazard, Guard the Worker, Implementation of Radiation Protection and Safety Measures, Distance, Shielding, Time, Monitoring Programme, Safety System. Radiation Protection in Radiological Service: Specific Requirement in Diagnostic Radiological Service

  3. Employment protection

    OpenAIRE

    Stefano Scarpetta

    2014-01-01

    Laws on hiring and firing are intended to protect workers from unfair behavior by employers, to counter imperfections in financial markets that limit workers’ ability to insure themselves against job loss, and to preserve firm-specific human capital. But by imposing costs on firms’ adaptation to changes in demand and technology, employment protection legislation may reduce not only job destruction but also job creation, hindering the efficient allocation of labor and productivity growth....

  4. Copyright protection

    OpenAIRE

    Plchotová, Gabriela

    2011-01-01

    The aim of this thesis is to offer a straightforward manual to anyone who authors their own original work or who utilises the original work of other creators. As such, it is necessary to briefly and clearly explain the historical development and essential terms of authorship as a concept and the origin of the need for copyright protection. Furthermore, this thesis includes chapters on copyright protection development specifically in the Czech Republic and the current definition of related law...

  5. Field tests for assessing electrical protection performance regarding electromechanical protection relays

    Directory of Open Access Journals (Sweden)

    Luis Alfredo Esteves

    2012-09-01

    Full Text Available This article describes designing and using a series of field tests (such as pick-up test and operating characteristics aimed at ascertaining the correct operation of relays’ electromechanical protection. The characteristic elements involved in adjusting electromechanical protection relays are presented.

  6. 40 CFR 52.2179 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2179 Section 52.2179 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) South Dakota § 52.2179 Visibility protection...

  7. 40 CFR 52.1606 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1606 Section 52.1606 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Jersey § 52.1606 Visibility protection...

  8. 40 CFR 52.1236 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1236 Section 52.1236 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Minnesota § 52.1236 Visibility protection. (a...

  9. 40 CFR 52.1488 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1488 Section 52.1488 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Nevada § 52.1488 Visibility protection. (a...

  10. 40 CFR 52.2383 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2383 Section 52.2383 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Vermont § 52.2383 Visibility protection. (a...

  11. 40 CFR 52.2498 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2498 Section 52.2498 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Washington § 52.2498 Visibility protection...

  12. 40 CFR 52.2304 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2304 Section 52.2304 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Texas § 52.2304 Visibility protection. (a...

  13. 40 CFR 52.1387 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1387 Section 52.1387 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Montana § 52.1387 Visibility protection. (a...

  14. 40 CFR 52.1831 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1831 Section 52.1831 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) North Dakota § 52.1831 Visibility protection...

  15. 40 CFR 52.2533 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2533 Section 52.2533 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) West Virginia § 52.2533 Visibility protection...

  16. 40 CFR 52.1183 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1183 Section 52.1183 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Michigan § 52.1183 Visibility protection. (a...

  17. 40 CFR 52.1531 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1531 Section 52.1531 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Hampshire § 52.1531 Visibility protection...

  18. 40 CFR 52.2452 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2452 Section 52.2452 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Virginia § 52.2452 Visibility protection. (a...

  19. 40 CFR 52.1033 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1033 Section 52.1033 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Maine § 52.1033 Visibility protection. (a...

  20. 40 CFR 52.1339 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1339 Section 52.1339 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Missouri § 52.1339 Visibility protection. (a...

  1. Corrosion and protection in reinforced concrete : Pulse cathodic protection: an improved cost-effective alternative

    NARCIS (Netherlands)

    Koleva, D.A.

    2007-01-01

    Corrosion and protection in reinforced concrete. Pulse cathodic protection: an improved cost-effective alternative. The aim of the research project was to study the possibilities for establishing a new or improved electrochemical method for corrosion prevention/protection for reinforced concrete.

  2. Gonad protective effect of radiation protective apron in chest radiography

    International Nuclear Information System (INIS)

    Hashimoto, Masatoshi; Kato, Hideyuki; Fujibuchi, Toshiou; Ochi, Shigehiro; Morita, Fuminori

    2004-01-01

    Depending on the facility, a radiation protective apron (protector) is used to protect the gonad from radiation exposure in chest radiography. To determine the necessity of using a protector during chest radiography, we measured the effect of the protector on the gonad in this study. First, using a human body phantom, we measured the absorbed dose of the female gonad with and without the protector, using a thermoluminescence dosimeter (TLD), and confirmed its protective effect. Using the protector, the absorbed dose was reduced to 28±2% and 39±4% for field sizes of 14 x 17 inch and 14 x 14 inch, respectively. Next, we used Monte Carlo simulation and confirmed, not only the validity of the actual measurement values, but also the fact that the influence of radiation on the absorbed dose of the gonad was mostly from scattered radiation from inside the body for the 14 x 17 inch field size, and also from the X-ray tube for the 14 x 14 inch field size. Although a certain protective effect is achieved by using the protector, the radiation dose to the gonad is only a few μGy even without a protector. Thus, the risk of a genetic effect would be as small as 10 -8 . Given that acceptable risk is below 10 -6 , we conclude the use of a radiation protective apron is not necessary for diagnostic chest radiography. (author)

  3. [Gonad protective effect of radiation protective apron in chest radiography].

    Science.gov (United States)

    Hashimoto, Masatoshi; Kato, Hideyuki; Fujibuchi, Toshiou; Ochi, Shigehiro; Morita, Fuminori

    2004-12-01

    Depending on the facility, a radiation protective apron (protector) is used to protect the gonad from radiation exposure in chest radiography. To determine the necessity of using a protector during chest radiography, we measured the effect of the protector on the gonad in this study. First, using a human body phantom, we measured the absorbed dose of the female gonad with and without the protector, using a thermoluminescence dosimeter (TLD), and confirmed its protective effect. Using the protector, the absorbed dose was reduced to 28+/-2% and 39+/-4% for field sizes of 14 x 17 inch and 14 x 14 inch, respectively. Next, we used Monte Carlo simulation and confirmed, not only the validity of the actual measurement values, but also the fact that the influence of radiation on the absorbed dose of the gonad was mostly from scattered radiation from inside the body for the 14 x 17 inch field size, and also from the X-ray tube for the 14 x 14 inch field size. Although a certain protective effect is achieved by using the protector, the radiation dose to the gonad is only a few microGy even without a protector. Thus, the risk of a genetic effect would be as small as 10(-8). Given that acceptable risk is below 10(-6), we conclude the use of a radiation protective apron is not necessary for diagnostic chest radiography.

  4. A Novel Adjustable Concept for Permeable Gas/Vapor Protective Clothing: Balancing Protection and Thermal Strain.

    Science.gov (United States)

    Bogerd, Cornelis Peter; Langenberg, Johannes Pieter; DenHartog, Emiel A

    2018-02-13

    Armed forces typically have personal protective clothing (PPC) in place to offer protection against chemical, biological, radiological and nuclear (CBRN) agents. The regular soldier is equipped with permeable CBRN-PPC. However, depending on the operational task, these PPCs pose too much thermal strain to the wearer, which results in a higher risk of uncompensable heat stress. This study investigates the possibilities of adjustable CBRN-PPC, consisting of different layers that can be worn separately or in combination with each other. This novel concept aims to achieve optimization between protection and thermal strain during operations. Two CBRN-PPC (protective) layers were obtained from two separate manufacturers: (i) a next-to-skin (NTS) and (ii) a low-burden battle dress uniform (protective BDU). In addition to these layers, a standard (non-CBRN protective) BDU (sBDU) was also made available. The effect of combining clothing layers on the levels of protection were investigated with a Man-In-Simulant Test. Finally, a mechanistic numerical model was employed to give insight into the thermal burden of the evaluated CBRN-PPC concepts. Combining layers results in substantially higher protection that is more than the sum of the individual layers. Reducing the airflow on the protective layer closest to the skin seems to play an important role in this, since combining the NTS with the sBDU also resulted in substantially higher protection. As expected, the thermal strain posed by the different clothing layer combinations decreases as the level of protection decreases. This study has shown that the concept of adjustable protection and thermal strain through multiple layers of CBRN-PPC works. Adjustable CBRN-PPC allows for optimization of the CBRN-PPC in relation to the threat level, thermal environment, and tasks at hand in an operational setting. © The Author(s) 2017. Published by Oxford University Press on behalf of the British Occupational Hygiene Society.

  5. User Privacy and Empowerment: Trends, Challenges, and Opportunities

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2018-01-01

    to the service providers. Considering business models that are slanted towards service provid-ers, privacy has become a crucial issue in today’s fast growing digital world. Hence, this paper elaborates personal information flow between users, service providers, and data brokers. We also discussed the significant...... privacy issues like present business models, user awareness about privacy and user control over per-sonal data. To address such issues, this paper also identified challenges that com-prise unavailability of effective privacy awareness or protection tools and the ef-fortless way to study and see the flow...... of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...

  6. Vote Markets, Latent Opportunism, and the Secret Ballot

    DEFF Research Database (Denmark)

    Justesen, Mogens Kamp; Bøttkjær, Louise Thorn; Gates, Scott

    The secret ballot is a cornerstone of modern democracy because it protects voter autonomy and allows voters to express their political preferences freely without fear of repercussions. In theory, the secret ballot is supposed to prevent vote buying – the exchange of votes for money or material...... goods – from operating during elections. Yet, empirical evidence from surveys around the world suggests that vote buying is a common feature of elections in new democracies. Indeed, a fundamental puzzle concerns why political parties use vote buying to mobilize electoral support when the secret ballot...... allows voters to renege on their commitments and vote as they please. In this paper, we address this puzzle by arguing that voter perceptions of ballot secrecy affect their responses to vote buying offers. Theoretically, we develop a game theoretical model, where voter beliefs in the secret ballot guide...

  7. 10 CFR 850.28 - Respiratory protection.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Respiratory protection. 850.28 Section 850.28 Energy... Respiratory protection. (a) The responsible employer must establish a respiratory protection program that complies with the respiratory protection program requirements of 29 CFR 1910.134, Respiratory Protection...

  8. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  9. Protective Health Education

    Science.gov (United States)

    Aydin, Ganime

    2016-01-01

    Problem Statement: As a result of wars, starvation, traffic accidents, homicide, infectious diseases, insufficient adult protection, migration, and inadequate legal reforms the mortality rate of children has become a serious problem in the world. Protective health education contributes to a child's physical and social health. In this case, the…

  10. Radiation protection in Bolivia

    International Nuclear Information System (INIS)

    Miranda Cuadros, A.A.

    2001-01-01

    Radiation protection in Bolivia has gone through a number of stages. Initially, in the 1970s, the focus was mainly on the analysis of environmental sources resulting from the nuclear tests carried out by France in the Pacific Ocean. Subsequently, the focus switched somewhat to radiation protection in connection with the mining of uranium and in the area of public health. During the third stage, radiation protection in other areas became important as the use of radiation sources was introduced. Finally, during the present -- fourth -- stage, radiation protection regulations are being introduced and mechanisms for the control of radiation sources are being established. (author)

  11. The Bald And Golden Eagle Protection Act, Species-Based Legal Protection And The Danger Of Misidentification

    Directory of Open Access Journals (Sweden)

    Johann C Knobel

    2015-12-01

    Full Text Available The Bald and Golden Eagle Protection Act of 1940 bestows legal protection on two North American eagle species in the United States of America. The Act was originally aimed at the legal protection of only one species: the Bald Eagle Haliaeetus leucocephalus, the national symbol of the USA. Later the Act was amended to extend protection also to the Golden Eagle Aquila chrysaetos. The Bald Eagle was an Endangered Species, but the Golden Eagle was not formally listed as Endangered nationwide in the USA. One of the reasons for extending legal protection to the Golden Eagle under the Act was to strengthen the legal protection of the Bald Eagle, because immature Bald Eagles were being misidentified as Golden Eagles and shot. Additional factors relating to Golden Eagle mortality also made legal protection of the Golden Eagle desirable. The danger that a rare and legally protected species can be misidentified and mistaken for a more common and unprotected species can therefore serve as a reason for bestowing legal protection on the more common species as well. Other factors may also indicate that legal protection of the more common species is desirable, making the case more compelling. If this line of reasoning is applied in respect of South African birds of prey, a strong case can be made in favour of extending legal protection under the national biodiversity legislation to more species than the small number of species currently enjoying such protection. Species that are listed as Vulnerable under South African national biodiversity legislation may be misidentified as species that are not subject to such protection. Additional factors are also present that make such an extension of legal protection desirable.

  12. Comments to the German society's for radiation protection (Gesellschaft fur Strahlenschutz) proposed principles for radiation protection

    International Nuclear Information System (INIS)

    Persson, L.

    2002-01-01

    The German Society for Radiation Protection (in German Gesellschaft fur Strahlenschutz) is a separate society for radiation protection in Germany in addition to the leading society named Association of German and Swiss Radiation Protection Specialists (in German Fachverband fur Strahlenschutz). The Society is an international professional society. There are several hundreds members of the German Society for Radiation Protection. The German Society for Radiation Protection is not a member of IRPA (the International Radiation Protection Society). The IRPA member is the Association of German and Swiss Radiation Protection Specialists. According to information given on the web site of the Society for Radiation Protection (www.gfstrahlenschutz.de) the Society was founded in 1990 because in the opinion of the founding members the older professional societies and associations have not adequately considered and implemented the present knowledge of radiation risks and radiation protection. In accordance with its statutes the society pursues besides other aims the best possible protection of humans and the environment from the detrimental action of ionising and non-ionising radiation. The dealing with ionising and non-ionising radiation can according to the Society only be justified on the basis of biological and medical state of the art knowledge

  13. 78 FR 30870 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Science.gov (United States)

    2013-05-23

    ... Marine Protected Areas to the National System of Marine Protected Areas AGENCY: National Marine Protected...) invited federal, state, commonwealth, and territorial marine protected area (MPA) programs with... of Marine Protected Areas of the United States (Framework), developed in response to Executive Order...

  14. The role of the protected area concept in protecting the world’s largest natural reserve: Antarctica

    Directory of Open Access Journals (Sweden)

    Kees Bastmeijer

    2009-06-01

    Full Text Available Should the entire Antarctic continent and the surrounding islands be recognised as a ‘protected area’ or as a continent where certain areas, just like anywhere else, may be designated as protected areas? To find an answer to this question, this paper first discusses the most important agreements and declarations on environmental protection in Antarctica. Next, these instruments are compared with the components of IUCN’s ‘protected area’ definition (2008. In the light of this overall protection of Antarctica, the instrument of designating areas as Antarctic Specially Protected Areas (ASPAs is discussed on the basis of a quick scan of 42 management plans for existing ASPAs. It is concluded that Antarctica could indeed be considered as a protected area and that the ASPA instrument is so shaped to provide specific areas with ‘extra protection’ by regulating human activities in those areas with a high level of detail. However, the continuous increase in human activities in Antarctica raises concerns with respect to the scope and completeness of the existing legal instruments. These concerns regarding the overall protection of Antarctica could become an argument for applying the ASPA instrument in respect of larger areas to ensure the comprehensive protection of at least certain parts of Antarctica. This would make the ASPA system more comparable with protected area systems in other parts of the world; however, strengthening the overall protection of Antarctica – parallel to the further development of the ‘specially’ protected area system - would be more consistent with Antarctica’s protected status as has developed since the Antarctic Treaty was signed 50 years ago.

  15. GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION.

    Energy Technology Data Exchange (ETDEWEB)

    PAQUETTE,D.E.; BENNETT,D.B.; DORSCH,W.R.; GOODE,G.A.; LEE,R.J.; KLAUS,K.; HOWE,R.F.; GEIGER,K.

    2002-05-31

    THE DEPARTMENT OF ENERGY ORDER 5400.1, GENERAL ENVIRONMENTAL PROTECTION PROGRAM, REQUIRES THE DEVELOPMENT AND IMPLEMENTATION OF A GROUNDWATER PROTECTION PROGRAM. THE BNL GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION PROVIDES AN OVERVIEW OF HOW THE LABORATORY ENSURES THAT PLANS FOR GROUNDWATER PROTECTION, MONITORING, AND RESTORATION ARE FULLY DEFINED, INTEGRATED, AND MANAGED IN A COST EFFECTIVE MANNER THAT IS CONSISTENT WITH FEDERAL, STATE, AND LOCAL REGULATIONS.

  16. Complete Rerouting Protection

    DEFF Research Database (Denmark)

    Stidsen, Thomas K.; Kjærulff, Peter

    2005-01-01

    In this paper we present a new protection method: Complete Rerouting. This is the most capacity e cient protection method for circuit switched networks and it is, to the best of our knowledge, the first time it has been described. We implement a column generation algorithm and test the performance...

  17. 40 CFR 52.2781 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2781 Section 52.2781 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... protection. (a) The requirements of section 169A of the Clean Air Act are not met, because the plan does not...

  18. 29 CFR 1926.100 - Head protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Head protection. 1926.100 Section 1926.100 Labor... § 1926.100 Head protection. (a) Employees working in areas where there is a possible danger of head... protected by protective helmets. (b) Helmets for the protection of employees against impact and penetration...

  19. 40 CFR 52.2132 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2132 Section 52.2132 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... protection. (a) The requirements of section 169A of the Clean Air Act are not met, because the plan does not...

  20. The physics of radiation protection

    International Nuclear Information System (INIS)

    Doerschel, B.; Schuricht, V.; Steuer, J.

    1996-01-01

    The book is aimed at both practising specialists and scientists wishing to learn about the fundamental science of radiation protection. The first part of the book, 'Physical Fundamentals of Radiation Protection', presents a concise description of radiation sources and radiation fields, interaction of radiation with matter, radiation effects and radiation damage, basic concept of radiation protection, radiation exposure of man, radiation protection measuring techniques and physical fundamentals for limiting radiation exposure. The second part, 'Calculational Exercises for Radiation Protection' is intended to supplement the first part by carrying out relevant calculations, amending and adding special aspects and to give guidance in solving practical problems. The book is written for scientists as well as for students and staff working in nuclear facilities, hospitals and institutions responsible for radiation and environmental protection. (UK)

  1. The usage of phase change materials in fire fighter protective clothing: its effect on thermal protection

    Science.gov (United States)

    Zhao, Mengmeng

    2017-12-01

    The thermal protective performance of the fire fighter protective clothing is of vital importance for fire fighters. In the study fabrics treated by phase change materials (PCMs) were applied in the multi-layered fabrics of the fire fighter protective clothing ensemble. The PCM fabrics were placed at the different layers of the clothing and their thermal protective performance were measured by a TPP tester. Results show that with the application of the PCM fabrics the thermal protection of the multi-layered fabrics was greatly increased. The time to reach a second degree burn was largely reduced. The location of the PCM fabrics at the different layers did not affect much on the thermal protective performance. The higher amount of the PCM adds on, the higher thermal protection was brought. The fabrics with PCMs of a higher melting temperature could contribute to higher thermal protection.

  2. System level ESD protection

    CERN Document Server

    Vashchenko, Vladislav

    2014-01-01

    This book addresses key aspects of analog integrated circuits and systems design related to system level electrostatic discharge (ESD) protection.  It is an invaluable reference for anyone developing systems-on-chip (SoC) and systems-on-package (SoP), integrated with system-level ESD protection. The book focuses on both the design of semiconductor integrated circuit (IC) components with embedded, on-chip system level protection and IC-system co-design. The readers will be enabled to bring the system level ESD protection solutions to the level of integrated circuits, thereby reducing or completely eliminating the need for additional, discrete components on the printed circuit board (PCB) and meeting system-level ESD requirements. The authors take a systematic approach, based on IC-system ESD protection co-design. A detailed description of the available IC-level ESD testing methods is provided, together with a discussion of the correlation between IC-level and system-level ESD testing methods. The IC-level ESD...

  3. Digital integrated protection system

    International Nuclear Information System (INIS)

    Savornin, M.; Furet, M.

    1978-01-01

    As a result of technological progress it is now possible to achieve more elaborate protection functions able to follow more closely the phenomena to be supervised. For this reason the CEA, Framatome and Merlin/Gerin/CERCI have undertaken in commonn to develop a Digital Integrated Protection System (D.I.P.S.). This system is designed with the following aims: to improve the safety of the station, . to improve its availability, . to facilitate installation, . to facilitate tests and maintenance. The main characteristics adopted are: . possibilities of obtaining more elaborate monitoring and protection algorithm treatments, . order 4 redundancy of transducers, associated instruments and signal processing, . possibility of inhibiting part of the protection system, . standardisation of equipment, physical and electrical separation of redundant units, . use of multiplexed connections, . automation of tests. Four flow charts are presented: - DIPS with four APUP (Acquisition and Processing Unit for Protection) - APUP - LSU (Logic Safeguard Unit), number LSU corresponding to number fluidic safeguard circuits, - structure of a function unit, - main functions of the APUP [fr

  4. Introduction to Machine Protection

    CERN Document Server

    Schmidt, R

    2016-01-01

    Protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent, although there was one paper that discussed beam-induced damage for the SLAC linac (Stanford Linear Accelerator Center) as early as in 1967. It is related to the increasing beam power of high-power proton accelerators, to the emission of synchrotron light by electron-positron accelerators and to the increase of energy stored in the beam. Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping ...

  5. Is radiation protection for the unborn child guaranteed by radiation protection for female workers?

    International Nuclear Information System (INIS)

    Nosske, C.; Karcher, K.

    2003-01-01

    ICRP Publication 88 recommends doses to embryo and fetus from intakes of radionuclides by the mother for various intake scenarios. Mainly by answering the question 'Is radiation protection for the unborn child guaranteed by radiation protection for female workers?' it has been assessed if the intake scenarios given in ICRP Publication 88 are adequate for radiation protection purposes. This is generally the case, but the consideration of an additional chronic intake scenario for early pregnancy would be helpful. It is demonstrated that following chronic intake by inhalation, for most radionuclides radiation protection for (female) workers is also adequate for protection of the unborn child, considered as a member of the public. However, there are a number of radionuclides for which possible intakes in routine operations should be more restricted (up to 1% of the annual limits on intake for workers in the case of nickel isotopes) to ensure radiation protection for the unborn child. (author)

  6. Emergency Protection from Aerosols

    Energy Technology Data Exchange (ETDEWEB)

    Cristy, G.A.

    2001-11-13

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved.

  7. Emergency protection from aerosols

    International Nuclear Information System (INIS)

    Cristy, G.A.; Chester, C.V.

    1981-07-01

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved

  8. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration

  9. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-12-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration.

  10. ETHIOPIAN WITNESS PROTECTION SYSTEM: COMPARATIVE ...

    African Journals Online (AJOL)

    witness protection involves social cohesion of the protected person. Scholars ..... interests' need to balance an accused right to know and confront prosecution ..... was reduced to 2.5 years through the fast tracking of witness protection cases.

  11. Environmental radiation protection - a brief history

    International Nuclear Information System (INIS)

    Zapantis, A.P.

    2003-01-01

    The effects of ionising radiation on man has been studied intensely for decades, and the system of radiation protection for man has been continually refined in the light of those studies. That system assumes that if man is protected, non-human biota at the species level will also be adequately protected. However, an increasing recognition of the need to protect the environment, and international agreements signed in 1992, have resulted in that paradigm being questioned, with the onus shifting slowly towards demonstrating that the environment is protected. Further, radiation protection agencies and environmental protection agencies around the world have now started considering the issue of developing a system of radiation protection for the environment. The International Commission on Radiological Protection (ICRP) and the International Atomic Energy Agency (IAEA) are also active in this area. The purpose of this paper is to briefly outline some of the issues confronting environmental and radiation protection specialists, and to mention some of the initiatives being taken by the international community to resolve those issues

  12. Radiation protection optimization of workers

    International Nuclear Information System (INIS)

    Lochard, J.

    1994-11-01

    This report presents the contribution of CEPN (study center on protection evaluation in nuclear area) to the Days of the French Radiation Protection Society (SFRP) on optimization of workers radiation protection in electronuclear, industrial and medical areas

  13. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J. [Oceaneering Space Systems, Houston, TX (United States)

    1995-10-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment.

  14. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment

  15. Radiation Protection Training in Lithuania

    International Nuclear Information System (INIS)

    Jankauskiene, D.

    2003-01-01

    Radiation Protection Training is an important component of Radiation Protection and serves for human radiation safety. According to the Lithuanian Law on Radiation Protection the legal persons and enterprises without the status of legal persons to conduct practices with sources or which workers work under exposure must organize at their own expenses a compulsory training and assessment of knowledge of the workers engaging in activities with the sources and radiation protection officers. Such training has been started in 1999. In Lithuania there are few institutions executing Radiation Protection training. Under requirements of legal act On Frequency and Procedure of Compulsory Training and Assessment Knowledge of the Workers Engage in Activities with the Sources of Ionising Radiation and Radiation Protection Officers these institutions have to prepare and coordinate training programs with the Radiation Protection Center. There are adopted different educating programs for Radiation Protection Training to the Workers and Radiation Protection Officers depending on character of work and danger of sources. The duration of Training is from 30 to 270 hours. The Training shall be renewed every five years passing 30 hors course. To ensure the adequate quality of training a great deal of attention is paid to qualifying the lectures. For this purpose, it was established an Evaluation commission to estimate the adequacy of lecturer's knowledge to requirements of Training programs. After passing exams the lectures get the qualification confirming certificates. The main task of our days is to establish and arrange the National Training Centre on Radiation Protection Training that would satisfy requirements and recommendations of legal documents of IAEA and EU for such kind of institutions of institutions. (Author)

  16. Groundwater protection management program plan

    International Nuclear Information System (INIS)

    1992-06-01

    US Department of Energy (DOE) Order 5400.1 requires the establishment of a groundwater protection management program to ensure compliance with DOE requirements and applicable Federal, state, and local laws and regulations. The Uranium Mill Tailings Remedial Action (UMTRA) Project Office has prepared a ''Groundwater Protection Management Program Plan'' (groundwater protection plan) of sufficient scope and detail to reflect the program's significance and address the seven activities required in DOE Order 5400.1, Chapter 3, for special program planning. The groundwater protection plan highlights the methods designed to preserve, protect, and monitor groundwater resources at UMTRA Project processing and disposal sites. The plan includes an overview of the remedial action status at the 24 designated processing sites and identifies project technical guidance documents and site-specific documents for the UMTRA groundwater protection management program. In addition, the groundwater protection plan addresses the general information required to develop a water resources protection strategy at the permanent disposal sites. Finally, the plan describes ongoing activities that are in various stages of development at UMTRA sites (long-term care at disposal sites and groundwater restoration at processing sites). This plan will be reviewed annually and updated every 3 years in accordance with DOE Order 5400.1

  17. Australia’s protected area network fails to adequately protect the world’s most threatened marine fishes

    Directory of Open Access Journals (Sweden)

    Karen R. Devitt

    2015-01-01

    Full Text Available In order to maintain ecosystems and biodiversity, Australia has long invested in the development of marine and terrestrial protected area networks. Within this land- and sea-scape, northern Australia represents a global population stronghold for four species of the world’s most threatened marine fish family, the sawfishes (family Pristidae. The distribution of sawfishes across northern Australia has previously only been coarsely estimated, and the adequacy of their representation in protected areas has not been evaluated. The calculated range of each species was intersected with Australia’s marine and terrestrial protected area datasets, and targets of 10% marine and 17% inland range protection were used to determine adequacy of sawfish range protection. Marine targets have been achieved for all species, but the inland range protection targets have not been met for any species. Results indicate that further protection of inland habitats is required in order to improve sawfish protection and habitat connectivity.

  18. Evolution of the radiation protection system; L'evolution du systeme de protection radiologique

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, R.H. [International Commission on Radiological Protection, Stockholm (Sweden); Schieber, C.; Cordoliani, Y.S. [Societe Francaise de Radioprotection, 92 - Fontenay aux Roses (France); Brechignac, F. [CEA Cadarache, Institut de Radioprotection et de Surete Nucleaire, Dept. de Protection de l' Environnement, 13 - Saint Paul Lez Durance (France)

    2003-07-01

    The evolution of the system of radiological protection: justification for new ICRP recommendations, thoughts of the SFRP work group about the evolution of the system of radiation protection proposed by the ICRP, protection of environment against ionizing radiations seen by the ICRP are the three parts of this chapter. (N.C.)

  19. The International Employment Protection Practices

    Directory of Open Access Journals (Sweden)

    Otenko Pavlo V.

    2017-09-01

    Full Text Available The article discusses the need for corporate protection of staff in accordance with both the European and the International labor law. The author defines the essence of the category of «protection of staff», its constituent elements and the importance of function of this mechanism in terms of corporate security. The main methods used in the international practice to achieve a high degree of protection of staff have been systematized and presented. The main stages of development and tendencies concerning the formation of instruments for protection of staff have been analyzed, and the principal indices to assess the degree of protection of staff have been determined.

  20. Radiation protection training in Switzerland

    International Nuclear Information System (INIS)

    Pfeiffer, H.J.

    1999-01-01

    An increasing number of radiation protection experts and of professionally exposed workers is temporarily or permanently working in a country other than the one where they received their radiation protection education or training. They all face the problem and the difficulties of recognition of radiation protection training programs by other countries. For this reason the German-Swiss Radiation Protection Association (Fachverband fuer Strahlenschutz; FS) made a proposal to IRPA for an action on the mutual recognition of radiation protection education in Europe. In a first step contacts were made with two other European Associations of France and UK in order to establish a joint working group. (orig.) [de

  1. Public health professionals' perceptions toward provision of health protection in England: a survey of expectations of Primary Care Trusts and Health Protection Units in the delivery of health protection.

    Science.gov (United States)

    Cosford, Paul A; O'Mahony, Mary; Angell, Emma; Bickler, Graham; Crawshaw, Shirley; Glencross, Janet; Horsley, Stephen S; McCloskey, Brian; Puleston, Richard; Seare, Nichola; Tobin, Martin D

    2006-12-07

    Effective health protection requires systematised responses with clear accountabilities. In England, Primary Care Trusts and the Health Protection Agency both have statutory responsibilities for health protection. A Memorandum of Understanding identifies responsibilities of both parties, but there is a potential lack of clarity about responsibility for specific health protection functions. We aimed to investigate professionals' perceptions of responsibility for different health protection functions, to inform future guidance for, and organisation of, health protection in England. We sent a postal questionnaire to all health protection professionals in England from the following groups: (a) Directors of Public Health in Primary Care Trusts; (b) Directors of Health Protection Units within the Health Protection Agency; (c) Directors of Public Health in Strategic Health Authorities and; (d) Regional Directors of the Health Protection Agency The response rate exceeded 70%. Variations in perceptions of who should be, and who is, delivering health protection functions were observed within, and between, the professional groups (a)-(d). Concordance in views of which organisation should, and which does deliver was high (> or =90%) for 6 of 18 health protection functions, but much lower (protection function was strongly correlated with the concordance (r = 0.65, P = 0.0038). Whilst we studied professionals' perceptions, rather than actual responses to incidents, our study suggests that there are important areas of health protection where consistent understanding of responsibility for delivery is lacking. There are opportunities to clarify the responsibility for health protection in England, perhaps learning from the approaches used for those health protection functions where we found consistent perceptions of accountability.

  2. 78 FR 24805 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Minimum...

    Science.gov (United States)

    2013-04-26

    ... Collection; Comment Request; Bank Secrecy Act Suspicious Activity Report Database Proposed Data Fields.'' The...; c. Commercial paper; d. Credit card; e. Debit card; f. Forex transactions; g. Futures/Options on...

  3. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems.The facility allows for the simulation of a...

  4. Hand protection from ultraviolet exposure

    International Nuclear Information System (INIS)

    Khazova, M.; O'Hagan, J.B.

    2006-01-01

    Full text of publication follows: A number of industrial applications and public services involve exposure to ultraviolet radiation (U.V.R.) from a variety of lamps and lasers, for example, in forensic examination, biological trans-illuminators, dentistry, laser material processing, microelectronics, etc. The proposed European Union Directive on Optical Radiation would place specific requirements on employers to provide adequate safety measures to reduce exposure to U.V.R., including gloves for hand protection. The selection of gloves should be based on a risk assessment and on the performance characteristics of the gloves for the task. However, current International and national standards do not describe evaluation procedures of disposable gloves for hand protection against non-ionising radiation. A methodology for assessment of the UV protection level for disposable gloves and a simple measurement protocol are proposed, based on a common approach with UV protection by clothing and sunscreens. Glove Ultraviolet Protection Factor is defined as a time-scale increase in exposure permitted for the hand protected by a glove with respect to an unprotected hand. However, the wide variety of U.V.R. sources and the real-life conditions of glove use (stretching and wetting the surface by liquids) bring substantial challenges to the assessment method. Our study of ∼ 50 samples of widely used disposable gloves made of different materials (nitrile, vinyl, latex and chloroprene) showed that for all tested gloves a change in U.V.R. attenuation with stretching is characteristic for the type of glove material and can be included as a scaling factor in the definition of U.V.R. protection. Glove material has a bigger effect on U.V.R. protection level than variations in the glove thickness or its colour. The following approaches are suggested to overcome the problem of variable U.V.R. sources: - Worst case scenario minimal protection level, most restrictive case - Application

  5. Hand protection from ultraviolet exposure

    Energy Technology Data Exchange (ETDEWEB)

    Khazova, M.; O' Hagan, J.B. [Health Protection Agency, Radiation Protection Division, Chilton, Did cot (United Kingdom)

    2006-07-01

    Full text of publication follows: A number of industrial applications and public services involve exposure to ultraviolet radiation (U.V.R.) from a variety of lamps and lasers, for example, in forensic examination, biological trans-illuminators, dentistry, laser material processing, microelectronics, etc. The proposed European Union Directive on Optical Radiation would place specific requirements on employers to provide adequate safety measures to reduce exposure to U.V.R., including gloves for hand protection. The selection of gloves should be based on a risk assessment and on the performance characteristics of the gloves for the task. However, current International and national standards do not describe evaluation procedures of disposable gloves for hand protection against non-ionising radiation. A methodology for assessment of the UV protection level for disposable gloves and a simple measurement protocol are proposed, based on a common approach with UV protection by clothing and sunscreens. Glove Ultraviolet Protection Factor is defined as a time-scale increase in exposure permitted for the hand protected by a glove with respect to an unprotected hand. However, the wide variety of U.V.R. sources and the real-life conditions of glove use (stretching and wetting the surface by liquids) bring substantial challenges to the assessment method. Our study of {approx} 50 samples of widely used disposable gloves made of different materials (nitrile, vinyl, latex and chloroprene) showed that for all tested gloves a change in U.V.R. attenuation with stretching is characteristic for the type of glove material and can be included as a scaling factor in the definition of U.V.R. protection. Glove material has a bigger effect on U.V.R. protection level than variations in the glove thickness or its colour. The following approaches are suggested to overcome the problem of variable U.V.R. sources: - Worst case scenario minimal protection level, most restrictive case - Application

  6. Physical protection system design and evaluation

    International Nuclear Information System (INIS)

    Williams, J.D.

    1997-01-01

    The design of an effective physical protection system includes the determination of physical protection system objectives, initial design of a physical protection system, design evaluation, and probably a redesign or refinement. To develop the objectives, the designer must begin by gathering information about facility operation and conditions, such as a comprehensive description of the facility, operating conditions, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not the materials being protected are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the material. The designer now knows the objectives of the physical protection system, that is, open-quotes what to protect against whom.close quotes The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors and assessment devices, entry control elements, procedures, communication devices, and protective forces personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to ensure protection rather than regarding each feature separately. Due to the complexity of the protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted. This paper reviews the physical protection system design and methodology mentioned above. Examples of the steps required and a brief introduction to some of the technologies used in modem physical protections system are given

  7. Discrete Input Signaling for MISO Visible Light Communication Channels

    KAUST Repository

    Arfaoui, Mohamed Amine

    2017-05-12

    In this paper, we study the achievable secrecy rate of visible light communication (VLC) links for discrete input distributions. We consider single user single eavesdropper multiple-input single-output (MISO) links. In addition, both beamforming and robust beamforming are considered. In the former case, the location of the eavesdropper is assumed to be known, whereas in the latter case, the location of the eavesdropper is unknown. We compare the obtained results with those achieved by some continuous distributions including the truncated generalized normal (TGN) distribution and the uniform distribution. We numerically show that the secrecy rate achieved by the discrete input distribution with a finite support is significantly improved as compared to those achieved by the TGN and the uniform distributions.

  8. Inhibición de la acumulación de Rojo Fenol por sulfametoxipiridazina en cortes de tejido renal

    Directory of Open Access Journals (Sweden)

    Jorge Sarmiento M.

    1962-10-01

    Full Text Available En relación con un trabajo anterior, en el cual se comprobó en el animal intacto la elevación de la concentración plasmática de penicilina cuando se había inyectado media hora antes sulfametoxipiridazina, el presente trabajo demuestra, en cortes de tejido renal adecuadamente conservados, que la capacidad de transporte del epitelio tubular renal para el rojo de fenol se inhibe en proporción a la concentración de sulfametoxipiridazina presente. Como el sistema enzimático responsable de la secreción tubular de la penicilina es idéntico al de la secreción del Rojo Fenol, se concluye que los resultados obtenidos son aplicables al caso de la penicilina.

  9. Secure Path Selection under Random Fading

    Directory of Open Access Journals (Sweden)

    Furqan Jameel

    2017-05-01

    Full Text Available Application-oriented Wireless Sensor Networks (WSNs promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP and Sub-optimal Secure Path (SSP to minimize the outage probability of secrecy capacity in the presence of multiple eavesdroppers. We consider dissimilar fading at the main and wiretap link and provide detailed evaluation of the impact of Nakagami-m and Rician-K factors on the secrecy performance of WSNs. Extensive simulations are performed to validate our findings. Although the optimal scheme ensures more security, yet the sub-optimal scheme proves to be a more practical approach to secure wireless links.

  10. Occupational radiation protection. Safety guide

    International Nuclear Information System (INIS)

    2002-01-01

    Occupational exposure to ionizing radiation can occur in a range of industries, medical institutions, educational and research establishments and nuclear fuel cycle facilities. Adequate radiation protection of workers is essential for the safe and acceptable use of radiation, radioactive materials and nuclear energy. In 1996, the Agency published Safety Fundamentals on Radiation Protection and the Safety of Radiation Sources (IAEA Safety Series No. 120) and International Basic Safety Standards for Protection against Ionizing, Radiation and for the Safety of Radiation Sources (IAEA Safety Series No. 115), both of which were jointly sponsored by the Food and Agriculture Organization of the United Nations, the IAEA, the International Labour Organisation, the OECD Nuclear Energy Agency, the Pan American Health Organization and the World Health Organization. These publications set out, respectively, the objectives and principles for radiation safety and the requirements to be met to apply the principles and to achieve the objectives. The establishment of safety requirements and guidance on occupational radiation protection is a major component of the support for radiation safety provided by the IAEA to its Member States. The objective of the IAEA's occupational protection programme is to promote an internationally harmonized approach to the optimization of occupational radiation protection, through the development and application of guidelines for restricting radiation exposures and applying current radiation protection techniques in the workplace. Guidance on meeting the requirements of the Basic Safety Standards for occupational protection is provided in three interrelated Safety Guides, one giving general guidance on the development of occupational radiation protection programmes and two giving more detailed guidance on the monitoring and assessment of workers' exposure due to external radiation sources and from intakes of radionuclides, respectively. These Safety

  11. Occupational radiation protection. Safety guide

    International Nuclear Information System (INIS)

    2006-01-01

    Occupational exposure to ionizing radiation can occur in a range of industries, medical institutions, educational and research establishments and nuclear fuel cycle facilities. Adequate radiation protection of workers is essential for the safe and acceptable use of radiation, radioactive materials and nuclear energy. In 1996, the Agency published Safety Fundamentals on Radiation Protection and the Safety of Radiation Sources (IAEA Safety Series No. 120) and International Basic Safety Standards for Protection against Ionizing, Radiation and for the Safety of Radiation Sources (IAEA Safety Series No. 115), both of which were jointly sponsored by the Food and Agriculture Organization of the United Nations, the IAEA, the International Labour Organisation, the OECD Nuclear Energy Agency, the Pan American Health Organization and the World Health Organization. These publications set out, respectively, the objectives and principles for radiation safety and the requirements to be met to apply the principles and to achieve the objectives. The establishment of safety requirements and guidance on occupational radiation protection is a major component of the support for radiation safety provided by the IAEA to its Member States. The objective of the IAEA's occupational protection programme is to promote an internationally harmonized approach to the optimization of occupational radiation protection, through the development and application of guidelines for restricting radiation exposures and applying current radiation protection techniques in the workplace. Guidance on meeting the requirements of the Basic Safety Standards for occupational protection is provided in three interrelated Safety Guides, one giving general guidance on the development of occupational radiation protection programmes and two giving more detailed guidance on the monitoring and assessment of workers' exposure due to external radiation sources and from intakes of radionuclides, respectively. These Safety

  12. Occupational radiation protection. Safety guide

    International Nuclear Information System (INIS)

    1999-01-01

    Occupational exposure to ionizing radiation can occur in a range of industries, medical institutions, educational and research establishments and nuclear fuel cycle facilities. Adequate radiation protection of workers is essential for the safe and acceptable use of radiation, radioactive materials and nuclear energy. In 1996, the Agency published Safety Fundamentals on Radiation Protection and the Safety of Radiation Sources (IAEA Safety Series No. 120) and International Basic Safety Standards for Protection against Ionizing, Radiation and for the Safety of Radiation Sources (IAEA Safety Series No. 115), both of which were jointly sponsored by the Food and Agriculture Organization of the United Nations, the IAEA, the International Labour Organisation, the OECD Nuclear Energy Agency, the Pan American Health Organization and the World Health Organization. These publications set out, respectively, the objectives and principles for radiation safety and the requirements to be met to apply the principles and to achieve the objectives. The establishment of safety requirements and guidance on occupational radiation protection is a major component of the support for radiation safety provided by the IAEA to its Member States. The objective of the IAEA's occupational protection programme is to promote an internationally harmonized approach to the optimization of occupational radiation protection, through the development and application of guidelines for restricting radiation exposures and applying current radiation protection techniques in the workplace. Guidance on meeting the requirements of the Basic Safety Standards for occupational protection is provided in three interrelated Safety Guides, one giving general guidance on the development of occupational radiation protection programmes and two giving more detailed guidance on the monitoring and assessment of workers' exposure due to external radiation sources and from intakes of radionuclides, respectively. These Safety

  13. Occupational radiation protection. Safety guide

    International Nuclear Information System (INIS)

    2004-01-01

    Occupational exposure to ionizing radiation can occur in a range of industries, medical institutions, educational and research establishments and nuclear fuel cycle facilities. Adequate radiation protection of workers is essential for the safe and acceptable use of radiation, radioactive materials and nuclear energy. In 1996, the Agency published Safety Fundamentals on Radiation Protection and the Safety of Radiation Sources (IAEA Safety Series No. 120) and International Basic Safety Standards for Protection against Ionizing, Radiation and for the Safety of Radiation Sources (IAEA Safety Series No. 115), both of which were jointly sponsored by the Food and Agriculture Organization of the United Nations, the IAEA, the International Labour Organisation, the OECD Nuclear Energy Agency, the Pan American Health Organization and the World Health Organization. These publications set out, respectively, the objectives and principles for radiation safety and the requirements to be met to apply the principles and to achieve the objectives. The establishment of safety requirements and guidance on occupational radiation protection is a major component of the support for radiation safety provided by the IAEA to its Member States. The objective of the IAEA's occupational protection programme is to promote an internationally harmonized approach to the optimization of occupational radiation protection, through the development and application of guidelines for restricting radiation exposures and applying current radiation protection techniques in the workplace. Guidance on meeting the requirements of the Basic Safety Standards for occupational protection is provided in three interrelated Safety Guides, one giving general guidance on the development of occupational radiation protection programmes and two giving more detailed guidance on the monitoring and assessment of workers' exposure due to external radiation sources and from intakes of radionuclides, respectively. These Safety

  14. Understanding of radiation protection in medicine. Pt. 2. Occupational exposure and system of radiation protection

    International Nuclear Information System (INIS)

    Iida, Hiroji; Yamamoto, Tomoyuki; Shimada, Yasuhiro

    1997-01-01

    Using a questionnaire we investigated whether radiation protection is correctly understood by medical doctors (n=140) and nurses (n=496). Although medical exposure is usually understood by medical doctors and dentists, their knowledge was found to be insufficient. Sixty-eight percent of medical doctors and 50% of dentists did not know about the system of radiation protection. Dose monitoring was not correctly carried out by approximately 20% of medical staff members, and medical personnel generally complained of anxiety about occupational exposure rather than medical exposure. They did not receive sufficient education on radiation exposure and protection in school. In conclusion, the results of this questionnaire suggested that they do not have adequate knowledge about radiation exposure and protection. The lack of knowledge about protection results in anxiety about exposure. To protect oneself from occupational exposure, individual radiation doses must be monitored, and medical practice should be reconsidered based on the results of monitoring. To eliminate unnecessary medical and occupational exposure and to justify practices such as radiological examinations, radiation protection should be well understood and appropriately carried out by medical doctors and dentists. Therefore, the education of medical students on the subject of radiation protection is required as is postgraduate education for medical doctors, dentists and nurses. (author)

  15. Physics for radiation protection

    CERN Document Server

    Martin, James E

    2013-01-01

    A much-needed working resource for health physicists and other radiation protection professionals, this volume presents clear, thorough, up-to-date explanations of the basic physics necessary to address real-world problems in radiation protection. Designed for readers with limited as well as basic science backgrounds, Physics for Radiation Protection emphasizes applied concepts and carefully illustrates all topics through examples as well as practice problems. Physics for Radiation Protection draws substantially on current resource data available for health physics use, providing decay schemes and emission energies for approximately 100 of the most common radionuclides encountered by practitioners. Excerpts of the Chart of the Nuclides, activation cross sections, fission yields, fission-product chains, photon attenuation coefficients, and nuclear masses are also provided.

  16. Anticorrosion protection of uranium

    Energy Technology Data Exchange (ETDEWEB)

    Goncharov, Ivan D.; Kazakovskaya, Tatiana; Tukmakov, Victor; Shapovalov, Vyacheslav [Russian Federal Nuclear Center-VNIIEF, 37, Mira Ave., RU-607190 Sarov (Nizhnii Gorod), 010450 (Russian Federation)

    2004-07-01

    Uranium in atmospheric conditions is non-stable. Sloughing products are being generated on its surface during storage or use. These corrosion products make many difficulties because of necessity to provide personnel safety. Besides, uranium corrosion may cause damage in parts. The first works devoted to uranium corrosion were performed in the framework of the USA Manhattan Project in the early forties of last century. Various methods of uranium protection were investigated, among them the galvanic one was the most studied. Later on the galvanic technology was patented. The works on this problem remains urgent up to the present time. In Russia, many methods of uranium corrosion protection, mainly against atmospheric corrosion, were tried on. In particular, such methods as diffusion zinc and paint coating were investigated. In the first case, a complex intermetallic U-Zn compound was formed but its protection was not reliable enough, this protection system was inconvenient and uncertain and that is why an additional paint coating was necessary. In the case of paint coatings another problem appeared. It was necessary to find such a coating where gas-permeability would prevail over water-permeability. Otherwise significant uranium corrosion occurs. This circumstance together with low mechanical resistance of paint coatings does not allow to use paint coating for long-term protection of uranium. Currently, there are following methods of uranium protection: ion-plasma, galvanic and thermo-vacuum annealing. These are described in this paper. In the end the issue of corrosion protection in reactor core zones is addressed. Here the greatest difficulties are caused when enriched uranium heated up to 500 deg. C needs anticorrosion protection. In this case various metal coatings are not reliable because of brittle inter-metallide formation. The reliable protection may be provided only up to the temperature plus 400 - 500 deg. C with the help of galvanic copper coating since

  17. Anticorrosion protection of uranium

    International Nuclear Information System (INIS)

    Goncharov, Ivan D.; Kazakovskaya, Tatiana; Tukmakov, Victor; Shapovalov, Vyacheslav

    2004-01-01

    Uranium in atmospheric conditions is non-stable. Sloughing products are being generated on its surface during storage or use. These corrosion products make many difficulties because of necessity to provide personnel safety. Besides, uranium corrosion may cause damage in parts. The first works devoted to uranium corrosion were performed in the framework of the USA Manhattan Project in the early forties of last century. Various methods of uranium protection were investigated, among them the galvanic one was the most studied. Later on the galvanic technology was patented. The works on this problem remains urgent up to the present time. In Russia, many methods of uranium corrosion protection, mainly against atmospheric corrosion, were tried on. In particular, such methods as diffusion zinc and paint coating were investigated. In the first case, a complex intermetallic U-Zn compound was formed but its protection was not reliable enough, this protection system was inconvenient and uncertain and that is why an additional paint coating was necessary. In the case of paint coatings another problem appeared. It was necessary to find such a coating where gas-permeability would prevail over water-permeability. Otherwise significant uranium corrosion occurs. This circumstance together with low mechanical resistance of paint coatings does not allow to use paint coating for long-term protection of uranium. Currently, there are following methods of uranium protection: ion-plasma, galvanic and thermo-vacuum annealing. These are described in this paper. In the end the issue of corrosion protection in reactor core zones is addressed. Here the greatest difficulties are caused when enriched uranium heated up to 500 deg. C needs anticorrosion protection. In this case various metal coatings are not reliable because of brittle inter-metallide formation. The reliable protection may be provided only up to the temperature plus 400 - 500 deg. C with the help of galvanic copper coating since

  18. Optimization and radiation protection culture

    International Nuclear Information System (INIS)

    Jeon, In Young; Shin, Hyeong Ki; Lee, Chan Mi

    2013-01-01

    Safety culture or radiation protection culture is based in common on the term, 'culture'. Culture is defined as the learned, shared set of symbols and patterns of basic assumptions, which is invented, discovered, or developed by a given group as it learns to cope with its problem of external adaptation and internal integration. Safety culture generally refers to the attitude and behaviors affecting safety performance. The concept of 'Safety Culture' was introduced after the Chernobyl accident in 1986. For the accident, nuclear society reached the conclusion that the cause was the wrong management attitude of the NPP, that is, deficient 'Safety Culture'. Recently, 'Radiation Protection Culture' was introduced as the core concept of nuclear safety culture. There have been many efforts to establish definition and develop assessment tool for radiation protection culture in international level such as ICRP and IRPA as well as NRC. In the same context with the safety culture, radiation protection culture is defined as 'the core values and behaviors resulting from a collective commitment by leaders and individual's to emphasize safety over competing goals to ensure protection of people and the environment.' It is worthwhile to recognize that regulatory enforcement in establishing healthy radiation protection culture of operators should be minimized because culture is not in the domain of regulatory enforcement. However, as 'ALARA', the most important concept in radiation protection, may be successfully achieved only in well established radiation protection culture, the least regulatory intervention would be needed in promoting and nurturing radiation protection culture in licensee. In addition, the concept of radiation protection culture should be addressed in plant operational policy to achieve the goals of ALARA. The pre-condition of the successful radiation protection culture is a healthy organizational

  19. Optimization and radiation protection culture

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, In Young; Shin, Hyeong Ki; Lee, Chan Mi [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-04-15

    Safety culture or radiation protection culture is based in common on the term, 'culture'. Culture is defined as the learned, shared set of symbols and patterns of basic assumptions, which is invented, discovered, or developed by a given group as it learns to cope with its problem of external adaptation and internal integration. Safety culture generally refers to the attitude and behaviors affecting safety performance. The concept of 'Safety Culture' was introduced after the Chernobyl accident in 1986. For the accident, nuclear society reached the conclusion that the cause was the wrong management attitude of the NPP, that is, deficient 'Safety Culture'. Recently, 'Radiation Protection Culture' was introduced as the core concept of nuclear safety culture. There have been many efforts to establish definition and develop assessment tool for radiation protection culture in international level such as ICRP and IRPA as well as NRC. In the same context with the safety culture, radiation protection culture is defined as 'the core values and behaviors resulting from a collective commitment by leaders and individual's to emphasize safety over competing goals to ensure protection of people and the environment.' It is worthwhile to recognize that regulatory enforcement in establishing healthy radiation protection culture of operators should be minimized because culture is not in the domain of regulatory enforcement. However, as 'ALARA', the most important concept in radiation protection, may be successfully achieved only in well established radiation protection culture, the least regulatory intervention would be needed in promoting and nurturing radiation protection culture in licensee. In addition, the concept of radiation protection culture should be addressed in plant operational policy to achieve the goals of ALARA. The pre-condition of the successful radiation protection culture is a healthy organizational

  20. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  1. La protection réelle de l’embryon The real protection of the embryo

    Directory of Open Access Journals (Sweden)

    Cosimo Marco Mazzoni

    2009-04-01

    Full Text Available Tutelle réelle de l’embryon signifie protection effective sur la base du droit positif en vigueur. L’étude cherche à affirmer que l’embryon humain est un objet sous tutelle, établi par l’ordre juridique. Elle conteste que l’embryon soit titulaire de droits subjectifs et donc qu’il puisse acquérir la qualification juridique de personne. La signification du terme de vie est conceptuellement différente au sens biologique et au sens juridique. Les Codes civils européens assignent la capacité juridique au fœtus qui est né vivant. Avant cet instant, le système juridique est en mesure d’accorder une protection à l’embryon toutefois différente de la norme qui protège la vie humaine de la personne déjà née. Bref, la protection de l’embryon est indépendante de sa qualification comme sujet.Real protection means effective protection through existing positive law. The article attempts to demonstrate that the embryo is an object entitled to a safeguards attributed by the law to human life as such. It denies that the embryo has subjective rights and therefore can acquire the legal qualification of subject of law or a person. The meaning of the concept of life is different, be it from the biological or legal point of view. European civil codes give legal capacity to the foetus who was born alive. Before this moment, the legal system has the possibility to give protection to the embryo but this protection is different from the norm protecting human life of an already born person. Consequently the protection of the embryo is independent from the qualification of the embryo as a subject.

  2. Nature protection and socio-economic development in selected protected landscape areas

    Czech Academy of Sciences Publication Activity Database

    Kušová, Drahomíra; Těšitel, Jan; Matějka, K.; Bartoš, Michael

    2005-01-01

    Roč. 24, č. 1 (2005), s. 109-123 ISSN 1335-342X R&D Projects: GA MŽP(CZ) SM/610/3/03 Institutional research plan: CEZ:AV0Z60870520 Keywords : protected landscape areas * nature protection * biosphere reserves * socio-economic development Subject RIV: DO - Wilderness Conservation Impact factor: 0.085, year: 2005

  3. Instructed officers Radiation Protection

    International Nuclear Information System (INIS)

    2007-01-01

    This law contains instructions on the prevention of radiological and contains 4 articles Article I: describe the responsibilities of the institutions that operate within the scope of radiological protection in terms of the number of radiation protection officers and personal Supervisors who available in the practices radiation field. Article II: talking about the conditions of radiation protection officers that must be available in the main officers and working field in larg institutions and thecondition of specific requirements for large enterprises of work permits in the field of radiological work that issued by the Council. Article III: the functions and duties of officers in the prevention of radiological oversee the development of radiation protection programmes in the planning stages, construction and preparing the rules of local labour and what it lead of such tasks.Article IV: radiation protection officers powers: to modify and approve the programme of prevention and radiation safety at the company, stop any unsafe steps, amend the steps of the usage, operation of materials, devices and so on

  4. Welfare Effects of Employment Protection

    NARCIS (Netherlands)

    Belot, M.V.K.; Boone, J.; van Ours, J.C.

    2002-01-01

    Employment protection is often related to costs incurred by the firms when they hire a worker.The stability of the employment relationship, enhanced by employment protection, is also favorable to the productivity of the job.We analyze employment protection focusing on this trade-off between

  5. 78 FR 981 - Agency Information Collection Activities; Renewal of a Currently Approved Collection; and Comment...

    Science.gov (United States)

    2013-01-07

    ...; Comment Request; Bank Secrecy Act Suspicious Activity Report Database Proposed Data Fields.'' The notice...; e. Debit card; f. Forex transactions; g. Futures/Options on futures; h. Hedge fund; i. Home equity...

  6. Environmental Protection Agency, Protecting Children's Environmental Health

    Science.gov (United States)

    ... and Research Centers Contact Us Share Protecting Children's Environmental Health Children are often more vulnerable to pollutants ... during development. Learn more about children's health, the environment, and what you can do. Basic Information Children ...

  7. The principles of radiation protection

    International Nuclear Information System (INIS)

    2004-01-01

    The aim of radiation protection is to avoid or to reduce the risks linked to ionizing radiation. In order to reduce these risks, the radiation protection uses three great principles: justification, optimization and limitation of radiation doses. to apply these principles, the radiation protection has regulatory and technical means adapted to three different categories of people: public, patients and workers. The nuclear safety authority elaborates the regulation, and carries out monitoring of the reliable application of radiation protection system. (N.C.)

  8. CEBAF - environmental protection program plan

    International Nuclear Information System (INIS)

    1995-01-01

    An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan

  9. Radiation protection of non-human species

    International Nuclear Information System (INIS)

    Leith, I.S.

    1993-01-01

    The effects of radiation on non-human species, both animals and plants, have long been investigated. In the disposal of radioactive wastes, the protection of non-human species has been investigated. Yet no radiation protection standard for exposure of animals and plants per se has been agreed. The International Commission on Radiological Protection has long taken the view that, if human beings are properly protected from radiation, other species will thereby be protected to the extent necessary for their preservation. However, the International Atomic Energy Agency has found it necessary to investigate the protection of non-human species where radioactivity is released to an environment unpopulated by human beings. It is proposed that the basis of such protection, and the knowledge of radiation effects on non-human species on which it is based, suggest a practical radiation protection standard for non-human species. (1 tab.)

  10. Endangered Species Protection Bulletins

    Science.gov (United States)

    Endangered Species Protection Bulletins set forth geographically specific pesticide use limitations for the protection of threatened and endangered (listed) species and their designated critical habitat. Find out how to get and use Bulletins.

  11. 23 CFR 140.916 - Protection.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Protection. 140.916 Section 140.916 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PAYMENT PROCEDURES REIMBURSEMENT Reimbursement for Railroad Work § 140.916 Protection. The cost of essential protective services which, in the opinion of a...

  12. Radiological protection act, 1991

    International Nuclear Information System (INIS)

    1991-01-01

    This Act provides for the establishment of the Radiological Protection Institute of Ireland and dissolves An Bord Fuinnimh Nuicleigh (the Board), transferring its assets and liabilities to the Institute. It sets out a range of radiation protection measures to be taken by various Ministers in the event of a radiological emergency and gives effect at national level to the Assistance Convention, the Early Notification Convention and the Physical Protection Convention. The Institute is the competent Irish authority for the three Conventions. (NEA) [fr

  13. 33 CFR 385.37 - Flood protection.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Flood protection. 385.37 Section... DEFENSE PROGRAMMATIC REGULATIONS FOR THE COMPREHENSIVE EVERGLADES RESTORATION PLAN Ensuring Protection of... Flood protection. (a) General. In accordance with section 601 of WRDA 2000, flood protection, consistent...

  14. 47 CFR 27.1221 - Interference protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Interference protection. 27.1221 Section 27... Technical Standards § 27.1221 Interference protection. (a) Interference protection will be afforded to BRS... height benchmark (hbm). (c) Protection for Receiving Antennas not Exceeding the Height Benchmark. Absent...

  15. Noise and Hearing Protection

    Science.gov (United States)

    ... ENTCareers Marketplace Find an ENT Doctor Near You Noise and Hearing Protection Noise and Hearing Protection Patient ... it is. How can I tell if a noise is dangerous? People differ in their sensitivity to ...

  16. Consumer Protection--Who Protects You? How Can You Protect Yourself? Proceed with Caution: Consumer Safety In the Home, I.

    Science.gov (United States)

    Saskatchewan Consumer and Commercial Affairs, Regina.

    The enormous and rapidly-increasing number of goods on the market makes it difficult to ensure that all consumer products are safe to use. Public concern about product safety has caused the enactment of a wide range of consumer protection laws. The result of this legislation has been that many agencies have been established to protect the public.…

  17. On population growth near protected areas.

    Directory of Open Access Journals (Sweden)

    Lucas N Joppa

    Full Text Available Protected areas are the first, and often only, line of defense in efforts to conserve biodiversity. They might be detrimental or beneficial to rural communities depending on how they alter economic opportunities and access to natural resources. As such, protected areas may attract or repel human settlement. Disproportionate increases in population growth near protected area boundaries may threaten their ability to conserve biodiversity.Using decadal population datasets, we analyze population growth across 45 countries and 304 protected areas. We find no evidence for population growth near protected areas to be greater than growth of rural areas in the same country. Furthermore, we argue that what growth does occur near protected areas likely results from a general expansion of nearby population centers.Our results contradict those from a recent study by Wittemyer et al., who claim overwhelming evidence for increased human population growth near protected areas. To understand the disagreement, we re-analyzed the protected areas in Wittemyer et al.'s paper. Their results are simply artifacts of mixing two incompatible datasets. Protected areas may experience unusual population pressures near their edges; indeed, individual case studies provide examples. There is no evidence, however, of a general pattern of disproportionate population growth near protected areas.

  18. Manual on radiation protection in hospital and general practice. Volume 4. Radiation protection in dentistry

    Energy Technology Data Exchange (ETDEWEB)

    Koren, K; Wuehrmann, A H

    1977-01-01

    The nine chapters of this manual on radiation protection in dentistry discuss the following topics: the need for radiation protection; delegation of responsibility; radiographic equipment; radiographic film; radiographic techniques; film processing and handling; patient doses; general radiation protection and monitoring; and educational standards. (HLW)

  19. Systems approach to tamper protection

    International Nuclear Information System (INIS)

    Myre, W.C.; Eaton, M.J.

    1980-01-01

    Tamper-protection is a fundamental requirement of effective containment and surveillance systems. Cost effective designs require that the tamper protection requirements be considered early in the design phase and at the system level. A discussion of tamper protection alternatives as well as an illustrative example system is presented

  20. Faraday Cage Protects Against Lightning

    Science.gov (United States)

    Jafferis, W.; Hasbrouck, R. T.; Johnson, J. P.

    1992-01-01

    Faraday cage protects electronic and electronically actuated equipment from lightning. Follows standard lightning-protection principles. Whether lightning strikes cage or cables running to equipment, current canceled or minimized in equipment and discharged into ground. Applicable to protection of scientific instruments, computers, radio transmitters and receivers, and power-switching equipment.

  1. Personal radiation protection in nuclear industry

    International Nuclear Information System (INIS)

    Gol'dshtejn, D.S.; Koshcheev, V.S.

    1983-01-01

    Specific peculiarities of organization of personal radiation protection at various nuclear industry enterprises when dealing with radioactive and other toxic substances are illuminated. Effect of heatin.g and cooling microclimate is discussed. Medical and technical requirements for personal protection means and tasks of personal protection in the field of nuclear industry are considered in short along with some peculiarities of application of different kinds of personal protection means and psychological aspects of personnel protection

  2. Phosphorus-32: practical radiation protection

    International Nuclear Information System (INIS)

    Ballance, P.E.; Morgan, J.

    1987-01-01

    This monograph offers practical advice to Radiation Protection Advisors, Radiation Protection Supervisors and Research Supervisors, together with research workers, particularly those in the field of molecular biological research. The subject is dealt with under the following headings: physical properties, radiation and measurement methods, radiation units, phosphorus metabolism and health risks, protection standards and practical radiation protection, administrative arrangements, accidents, decontamination, emergency procedures, a basic written system for radiochemical work, with specialised recommendations for 32 P, and guidance notes of accident situations involving 32 P. (U.K.)

  3. 33 CFR 159.75 - Overcurrent protection.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Overcurrent protection. 159.75...) POLLUTION MARINE SANITATION DEVICES Design, Construction, and Testing § 159.75 Overcurrent protection. Overcurrent protection must be provided within the unit to protect subcomponents of the device if the...

  4. Radiation protection in nuclear medicine

    Energy Technology Data Exchange (ETDEWEB)

    Volodin, V; Hanson, G P

    1993-12-31

    The goal of this Chapter is to give a general outline of the essential principles and procedures for radiation protection in a nuclear medicine department where radionuclides are used for diagnosis and therapy. More detailed recommendations regarding radiation protection in nuclear medicine are given in the publications of the International Commission on Radiation Protection (ICRP, publications 25, 57, 60) and in ILO/IAEA/WHO Manual on Radiation Protection in Hospitals and General Practice (Volume 2: Unsealed Sources, WHO, Geneva, 1975), on which this Chapter is based. This chapter is not intended to replace the above-mentioned international recommendations on radiation protection, as well as existing national regulations on this subject, but intended only to provide guidance for implementing these recommendations in clinical practice

  5. Radiation protection in nuclear medicine

    International Nuclear Information System (INIS)

    Volodin, V.; Hanson, G.P.

    1992-01-01

    The goal of this Chapter is to give a general outline of the essential principles and procedures for radiation protection in a nuclear medicine department where radionuclides are used for diagnosis and therapy. More detailed recommendations regarding radiation protection in nuclear medicine are given in the publications of the International Commission on Radiation Protection (ICRP, publications 25, 57, 60) and in ILO/IAEA/WHO Manual on Radiation Protection in Hospitals and General Practice (Volume 2: Unsealed Sources, WHO, Geneva, 1975), on which this Chapter is based. This chapter is not intended to replace the above-mentioned international recommendations on radiation protection, as well as existing national regulations on this subject, but intended only to provide guidance for implementing these recommendations in clinical practice

  6. Depth protection system

    International Nuclear Information System (INIS)

    Arita, Setsuo; Izumi, Shigeru; Suzuki, Satoru; Noguchi, Atomi.

    1988-01-01

    Purpose: To previously set a nuclear reactor toward safety side by the reactor scram if an emergency core cooling system is failed to operate. Constitution If abnormality occurs in an emergency core cooling system or an aqueous boric acid injection system, a reactor protection system is operated and, if the reactor protection system shows an abnormal state, a control rod withdrawal inhibition system is operated as a fundamental way. For instance, when the driving power source voltage for the emergency core cooling system is detected and, if it is lower than a predetermined value, the reactor protection system is operated. Alternatively, if the voltage goes lower than the predetermined value, the control rod withdrawal is inhibited. In addition, stopping for the feedwater system is inhibited. Further, integrity of the driving means for the emergency core cooling system is positively checked and the protection function is operated depending on the result of check. Since the nuclear reactor can be set toward the safety side even if the voltage for the driving power source of the aqueous boric acid injection system is lower than a predetermined value, the reactor safety can further be improved. (Horiuchi, T.)

  7. 12 CFR 21.11 - Suspicious Activity Report.

    Science.gov (United States)

    2010-01-01

    ... or a suspicious transaction related to a money laundering activity or a violation of the Bank Secrecy... of suspects. (4) Transactions aggregating $5,000 or more that involve potential money laundering or...

  8. 10 CFR 61.9 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... occurs because the employee has engaged in protected activities. An employee's engagement in protected... 10 Energy 2 2010-01-01 2010-01-01 false Employee protection. 61.9 Section 61.9 Energy NUCLEAR... Provisions § 61.9 Employee protection. (a) Discrimination by a Commission licensee, an applicant for a...

  9. 10 CFR 40.7 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... protected activities. An employee's engagement in protected activities does not automatically render him or... 10 Energy 1 2010-01-01 2010-01-01 false Employee protection. 40.7 Section 40.7 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC LICENSING OF SOURCE MATERIAL General Provisions § 40.7 Employee protection. (a...

  10. 10 CFR 70.7 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... occurs because the employee has engaged in protected activities. An employee's engagement in protected... 10 Energy 2 2010-01-01 2010-01-01 false Employee protection. 70.7 Section 70.7 Energy NUCLEAR... Employee protection. (a) Discrimination by a Commission licensee, an applicant for a Commission license, or...

  11. 10 CFR 60.9 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... occurs because the employee has engaged in protected activities. An employee's engagement in protected... 10 Energy 2 2010-01-01 2010-01-01 false Employee protection. 60.9 Section 60.9 Energy NUCLEAR... Provisions § 60.9 Employee protection. (a) Discrimination by a Commission licensee, an applicant for a...

  12. 10 CFR 50.7 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... occurs because the employee has engaged in protected activities. An employee's engagement in protected... 10 Energy 1 2010-01-01 2010-01-01 false Employee protection. 50.7 Section 50.7 Energy NUCLEAR... Employee protection. (a) Discrimination by a Commission licensee, an applicant for a Commission license, or...

  13. 10 CFR 63.9 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... because the employee has engaged in protected activities. An employee's engagement in protected activities... 10 Energy 2 2010-01-01 2010-01-01 false Employee protection. 63.9 Section 63.9 Energy NUCLEAR... MOUNTAIN, NEVADA General Provisions § 63.9 Employee protection. (a) Discrimination by a Commission licensee...

  14. 10 CFR 30.7 - Employee protection.

    Science.gov (United States)

    2010-01-01

    ... occurs because the employee has engaged in protected activities. An employee's engagement in protected... 10 Energy 1 2010-01-01 2010-01-01 false Employee protection. 30.7 Section 30.7 Energy NUCLEAR... Provisions § 30.7 Employee protection. (a) Discrimination by a Commission licensee, an applicant for a...

  15. 46 CFR 154.1405 - Respiratory protection.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Respiratory protection. 154.1405 Section 154.1405... Equipment § 154.1405 Respiratory protection. When Table 4 references this section, a vessel carrying the listed cargo must have: (a) Respiratory protection equipment for each person on board that protects the...

  16. 14 CFR 23.1419 - Ice protection.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Ice protection. 23.1419 Section 23.1419... Ice protection. If certification with ice protection provisions is desired, compliance with the... performed to establish, on the basis of the airplane's operational needs, the adequacy of the ice protection...

  17. Application of the diagnostic radiological index of protection to protective garments

    Energy Technology Data Exchange (ETDEWEB)

    Pasciak, Alexander S. [Department of Radiology, The University of Tennessee Medical Center at Knoxville, Knoxville, Tennessee 37922 (United States); Jones, A. Kyle, E-mail: kyle.jones@mdanderson.org [Department of Imaging Physics, The University of Texas MD Anderson Cancer Center, Houston, Texas 77030 (United States); Wagner, Louis K. [Department of Diagnostic and Interventional Imaging, The University of Texas Medical School at Houston, Houston, Texas 77030 (United States)

    2015-02-15

    Purpose: Previously, the diagnostic radiological index of protection (DRIP) was proposed as a metric for quantifying the protective value of radioprotective garments. The DRIP is a weighted sum of the percent transmissions of different radiation beams through a garment. Ideally, the beams would represent the anticipated stray radiation encountered during clinical use. However, it is impractical to expect a medical physicist to possess the equipment necessary to accurately measure transmission of scattered radiation. Therefore, as a proof of concept, the authors tested a method that applied the DRIP to clinical practice. Methods: Primary beam qualities used in interventional cardiology and radiology were observed and catalogued. Based on the observed range of beam qualities, five representative clinical primary beam qualities, specified by kV and added filtration, were selected for this evaluation. Monte Carlo simulations were performed using these primary beams as source definitions to generate scattered spectra from the clinical primary beams. Using numerical optimization, ideal scatter mimicking primary beams, specified by kV and added aluminum filtration, were matched to the scattered spectra according to half- and quarter-value layers and spectral shape. To within reasonable approximation, these theoretical scatter-mimicking primary beams were reproduced experimentally in laboratory x ray beams and used to measure transmission through pure lead and protective garments. For this proof of concept, the DRIP for pure lead and the garments was calculated by assigning equal weighting to percent transmission measurements for each of the five beams. Finally, the areal density of lead and garments was measured for consideration alongside the DRIP to assess the protective value of each material for a given weight. Results: The authors identified ideal scatter mimicking primary beams that matched scattered spectra to within 0.01 mm for half- and quarter-value layers in

  18. Application of the diagnostic radiological index of protection to protective garments.

    Science.gov (United States)

    Pasciak, Alexander S; Jones, A Kyle; Wagner, Louis K

    2015-02-01

    Previously, the diagnostic radiological index of protection (DRIP) was proposed as a metric for quantifying the protective value of radioprotective garments. The DRIP is a weighted sum of the percent transmissions of different radiation beams through a garment. Ideally, the beams would represent the anticipated stray radiation encountered during clinical use. However, it is impractical to expect a medical physicist to possess the equipment necessary to accurately measure transmission of scattered radiation. Therefore, as a proof of concept, the authors tested a method that applied the DRIP to clinical practice. Primary beam qualities used in interventional cardiology and radiology were observed and catalogued. Based on the observed range of beam qualities, five representative clinical primary beam qualities, specified by kV and added filtration, were selected for this evaluation. Monte Carlo simulations were performed using these primary beams as source definitions to generate scattered spectra from the clinical primary beams. Using numerical optimization, ideal scatter mimicking primary beams, specified by kV and added aluminum filtration, were matched to the scattered spectra according to half- and quarter-value layers and spectral shape. To within reasonable approximation, these theoretical scatter-mimicking primary beams were reproduced experimentally in laboratory x ray beams and used to measure transmission through pure lead and protective garments. For this proof of concept, the DRIP for pure lead and the garments was calculated by assigning equal weighting to percent transmission measurements for each of the five beams. Finally, the areal density of lead and garments was measured for consideration alongside the DRIP to assess the protective value of each material for a given weight. The authors identified ideal scatter mimicking primary beams that matched scattered spectra to within 0.01 mm for half- and quarter-value layers in copper and within 5% for the

  19. Application of the diagnostic radiological index of protection to protective garments

    International Nuclear Information System (INIS)

    Pasciak, Alexander S.; Jones, A. Kyle; Wagner, Louis K.

    2015-01-01

    Purpose: Previously, the diagnostic radiological index of protection (DRIP) was proposed as a metric for quantifying the protective value of radioprotective garments. The DRIP is a weighted sum of the percent transmissions of different radiation beams through a garment. Ideally, the beams would represent the anticipated stray radiation encountered during clinical use. However, it is impractical to expect a medical physicist to possess the equipment necessary to accurately measure transmission of scattered radiation. Therefore, as a proof of concept, the authors tested a method that applied the DRIP to clinical practice. Methods: Primary beam qualities used in interventional cardiology and radiology were observed and catalogued. Based on the observed range of beam qualities, five representative clinical primary beam qualities, specified by kV and added filtration, were selected for this evaluation. Monte Carlo simulations were performed using these primary beams as source definitions to generate scattered spectra from the clinical primary beams. Using numerical optimization, ideal scatter mimicking primary beams, specified by kV and added aluminum filtration, were matched to the scattered spectra according to half- and quarter-value layers and spectral shape. To within reasonable approximation, these theoretical scatter-mimicking primary beams were reproduced experimentally in laboratory x ray beams and used to measure transmission through pure lead and protective garments. For this proof of concept, the DRIP for pure lead and the garments was calculated by assigning equal weighting to percent transmission measurements for each of the five beams. Finally, the areal density of lead and garments was measured for consideration alongside the DRIP to assess the protective value of each material for a given weight. Results: The authors identified ideal scatter mimicking primary beams that matched scattered spectra to within 0.01 mm for half- and quarter-value layers in

  20. 75 FR 972 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Science.gov (United States)

    2010-01-07

    ... Marine Protected Areas to the National System of Marine Protected Areas AGENCY: NOAA, Department of... Federal, State and territorial marine protected area programs to join the National System of Marine Protected Areas. SUMMARY: NOAA and the Department of the Interior (DOI) invited Federal, State, commonwealth...