WorldWideScience

Sample records for secure group formation

  1. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing......Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task; as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard...... wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate...

  2. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing...

  3. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  4. Formation of nuclear security culture in Ukraine

    Directory of Open Access Journals (Sweden)

    V. I. Gavryliuk

    2014-06-01

    Full Text Available Issues of nuclear security culture formation are considered in the article. Information on establishing and ac-tivity of Working Group for formation and development of nuclear security culture being held during 2010 – 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is il-lustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development.

  5. Formation of nuclear security culture in Ukraine

    International Nuclear Information System (INIS)

    Gavrilyuk, V.Yi.; Gavrilyuk-Burakova, A.V.; Drapej, S.S.; Parkhomenko, V.V.; Proskuryin, D.V.; Romanova, O.P.

    2014-01-01

    Issues of nuclear security culture formation are considered in the article. Information on establishing and activity of Working Group for formation and development of nuclear security culture being held during 2010 - 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is illustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development

  6. Designing for informed group formation

    DEFF Research Database (Denmark)

    Nicolajsen, Hanne Westh; Juel Jacobsen, Alice; Riis, Marianne

    2012-01-01

    A new design ―project preparation‖ preparing for the group formation in problem based project work is proposed and investigated. The main problem is to overcome group formation based on existing relations. The hypothesis is that theme development and group formation are somewhat counterproductive...

  7. Designing for informed group formation

    DEFF Research Database (Denmark)

    Nicolajsen, Hanne Westh; Juel Jacobsen, Alice; Riis, Marianne

    2012-01-01

    A new design ―project preparation‖ preparing for the group formation in problem based project work is proposed and investigated. The main problem is to overcome group formation based on existing relations. The hypothesis is that theme development and group formation are somewhat counterproductive....... Following research based design methodology an experiment separating the two was initiated.This was to provide for more openness and creativity in contrast to a design in which existing relations seem predominant....

  8. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  9. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  10. Food security: what the community wants. Learning through focus groups.

    Science.gov (United States)

    Hargrove, D; Dewolfe, J A; Thompson, L

    1994-01-01

    We used focus groups to learn the range of issues threatening food security of low income residents in our community. Five major themes emerged from the discussions: literacy, money, time, mental health and self-esteem, suggesting several approaches that could help ensure food security: 1) education, 2) sharing of resources, 3) coalition building, and 4) advocacy. Education programs have to be practical, allowing for demonstrations and hands-on learning while emphasizing skill building and problem solving. Incorporating a social aspect into learning may compensate for the social isolation and would capitalize on the impressive mutual support we witnessed. Strategies based on self-help and peer assistance may counteract low self-esteem and overcome suspicion of health professionals. A community-wide effort is needed to address the factors contributing to food insecurity. We envision the formation of a coalition of professionals, agencies, and low income people to develop a comprehensive strategy for achieving food security.

  11. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  12. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  13. Group formation in early clinical project

    DEFF Research Database (Denmark)

    Østergaard, Gert Værge

    Research shows that getting involved is a key aspect of learning, and a way of getting involved is through study groups [1]. Forming groups are always a theme that is discussed, both amongst faculty and students. There is a different approach at different semesters regarding this formation...

  14. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  15. Consensus formation on coevolving networks: groups' formation and structure

    International Nuclear Information System (INIS)

    Kozma, Balazs; Barrat, Alain

    2008-01-01

    We study the effect of adaptivity on a social model of opinion dynamics and consensus formation. We analyse how the adaptivity of the network of contacts between agents to the underlying social dynamics affects the size and topological properties of groups and the convergence time to the stable final state. We find that, while on static networks these properties are determined by percolation phenomena, on adaptive networks the rewiring process leads to different behaviors: adaptive rewiring fosters group formation by enhancing communication between agents of similar opinion, though it also makes possible the division of clusters. We show how the convergence time is determined by the characteristic time of link rearrangement. We finally investigate how the adaptivity yields nontrivial correlations between the internal topology and the size of the groups of agreeing agents

  16. Integrating security in a group oriented distributed system

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  17. Security Provision and Political Formation in Hybrid Orders

    Directory of Open Access Journals (Sweden)

    Michael Lawrence

    2017-08-01

    Full Text Available The security sector reform literature is increasingly turning towards the inclusion of non-state security providers, but the long-term patterns of political development to which such engagement might contribute remain underexplored. This article thus provides several lenses with which to understand the relationship between non-state security provision and political development. It first presents three perspectives (functionalism, political economy, and communitarianism with which to understand the nature and behavior of non-state security providers. Second, it outlines five possible long-term trajectories of political formation and the role of non-state security providers in each. These discussions highlight the idea of hybridity, and the remainder of the paper argues that the concept can be usefully applied in (at least two ways. The third section proposes that hybridity can help overcome longstanding but misleading conceptual binaries, while the fourth rearticulates hybridity as a dynamic developmental process – 'hybridization' – that can be contrasted with security politics as the underlying logic by which security providers (both state and non-state interact and change over time.

  18. Factors of Formation of the tax Potential of the Securities Market

    Directory of Open Access Journals (Sweden)

    Gumenniy Anatoliy A.

    2014-02-01

    Full Text Available The article is devoted to the problems of identification of factors that influence volumes and dynamics of the tax potential of the securities market. The goal of the article is detection and systematisation of factors of formation and realisation of the tax potential of the securities market. In the result of the conducted study it systemises factors of formation and realisation of the tax potential of the securities market by two groups: economic and legislatory organisational. The main of the economic factors are: state of economic development, degree of the shadow economy, level of savings of the population, level of trust of the population and level of inflation. The article justifies interconnection that exist between the said factors and volumes of the tax potential of the securities market. In particular, it proves that increase of volumes of the shadow economy facilitates reduction of the tax potential of the securities market, since it facilitates outflow of capital from the official sector of economy. Growth of unorganised savings of the population, the volume of which grows proportionally to the growth of the level of distrust of the population to the securities market, has a negative impact on formation of the tax potential of the securities market. Degree of the negative impact of the said factors grows in the event of deterioration of the state of the macro-economic situation and growth of inflation. The legislatory organisational factors are: object, base, rates of taxation of securities trading and the securities market infrastructure. The article proves that low level of infrastructure development could significantly reduce the tax potential of the securities market. The proposed approach to the study of factors of formation of the tax potential gives a possibility to mark out, apart from de-shadowing of operations and expansion of the taxation base, one more direction on increase of the tax potential of the securities market

  19. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  20. Expert group formation using facility location analysis

    NARCIS (Netherlands)

    Neshati, M.; Beigy, H.; Hiemstra, Djoerd

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a multi-aspect task. While a diverse set of skills are needed to perform a multi-aspect task, the group of assigned experts should be able to collectively cover all these required skills. We

  1. Expert group formation using facility location analysis

    NARCIS (Netherlands)

    Neshati, Mahmood; Beigy, Hamid; Hiemstra, Djoerd

    2014-01-01

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a multi-aspect task. While a diverse set of skills are needed to perform a multi-aspect task, the group of assigned experts should be able to collectively cover all these required skills. We

  2. Star formation suppression in compact group galaxies

    DEFF Research Database (Denmark)

    Alatalo, K.; Appleton, P. N.; Lisenfeld, U.

    2015-01-01

    , bars, rings, tidal tails, and possibly nuclear outflows, though the molecular gas morphologies are more consistent with spirals and earlytype galaxies than mergers and interacting systems. Our CO-imaged HCG galaxies, when plotted on the Kennicutt-Schmidt relation, shows star formation (SF) suppression...... color space. This supports the idea that at least some galaxies in HCGs are transitioning objects, where a disruption of the existing molecular gas in the system suppresses SF by inhibiting the molecular gas from collapsing and forming stars efficiently. These observations, combined with recent work...

  3. Risk behaviour and group formation in microcredit groups in Eritrea

    NARCIS (Netherlands)

    Lensink, Robert; Mehrteab, Habteab T.

    2003-01-01

    We conducted a survey in 2001 among members and group leaders of borrowers who accessed loans from two microcredit programs in Eritrea. Using the results from this survey, this paper aims to provide new insights into the empirical relevance of the homogeneous matching hypothesis for microcredit

  4. Risk Behaviour and Group Formation in Microcredit Groups in Eritrea

    NARCIS (Netherlands)

    Lensink, B.W.; Mehrteab, H.T.

    2006-01-01

    We conducted a survey in 2001 among members and group leaders of borrowers who accessed loans from two microcredit programs in Eritrea. Using the results from this survey, this paper aims to provide new insights into the empirical relevance of the homogeneous matching hypothesis for microcredit

  5. Politics and Business Group Formation in China

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik

    2012-01-01

    As a result of economic reform and administrative restructuring in China, a number of powerful state-owned business groups (“national champions”) have emerged within sectors of strategic importance. They are headed by a new corporate elite which enjoys unprecedentedly high levels of remuneration...... makes it possible to transfer/rotate business leaders to take up positions in state and Party agencies. In order to conceptualize the coexistence of the contradicting forces for further enterprise autonomy and continued central control that characterizes the evolving relationship between business groups...

  6. Authentic leadership, group cohesion and group identification in security and emergency teams.

    Science.gov (United States)

    García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio

    2015-01-01

    Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.

  7. FORMATION OF FINANCIAL SECURITY OF THE ENTERPRISE BASED ON STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    Nadiya Rushchyshyn

    2017-09-01

    Full Text Available The purpose of the study is to improve ways of forming financial security of the enterprise based onstrategic planning. The subject of the research: formation of financial security of the enterprise on the basis of strategicplanning. The methodological background of the research is a set of theoretical and general scientific methods:analysis and synthesis, theoretical and logical generalization, grouping, abstraction, and others. The paper providesa general description of the core approaches defining the concept of “financial security of the enterprise”. Functionalgoals of financial security of the enterprise are outlined, namely: ensuring financial stability and independence;achievement of high competitiveness in the market of goods, works, services; ensuring high efficiency of financialand economic activity; ensuring high liquidity of assets, and increasing the market value of the enterprise; supportfor the appropriate level of business activity and image; formation of information security and commercialsecrets; efficient organization of security of share capital and assets of the enterprise. The scheme of organizationof financial security organization is considered based on strategic planning. It is determined that the strategicplanning results in strategic plan (strategy for ensuring the financial security of the enterprise. Such a strategyshould be consistent with both financial and the company’s overall strategies, as well as main goals and objectives.For the most effective implementation of the chosen financial security strategy at the enterprise, it is expedientto develop and implement a system of plans covering all aspects of the strategic planning process, including thetarget program, strategic, tactical, calendar, and individual plans. The system of plans should specify: the purpose ofchanges in the functioning of internal systems of the enterprise; terms of making changes; the work that needs tobe done to make changes; their

  8. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  9. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  10. Government's role in power supply security. A working group report

    International Nuclear Information System (INIS)

    2004-01-01

    The working group was to analyse the Government's role in terms of improving the security of supply of the electricity market in exceptionally difficult capacity situations and to make propositions for the ways of arranging a tendering procedure concerning security of supply and capacity control, so as to meet the requirements of the EC Energy Internal Market Directives after 1 July 2004. The Working Group considers that there is no need at this stage to introduce a separate new system intended as a supplement to technical reserves in Finland. Such a system would not bring new capacity for the use of the power system, and in the case of existing capacity, production would only be transferred from one market to another. However, the situation may change from this, if there occur such factors on the market that aim to raise the market price of electricity or if it turned out that reserve power plants would be decommissioned on a large scale. The working group proposes that such a provision be added to the Electricity Market Act that would oblige the electricity supplier to notify the Energy Market Authority of a planned service outage of a power plant of at least 100 MVA producing electricity separately, which would fall within the time period 1 December - 28 February. The Energy Market Authority would be vested with the powers to postpone the outage due to a tight output situation, if there are not technical or safety- bound obstacles to this. It is important for the sufficiency of the power need of the Internal Market that the price signals of the market are reflected to both producers and consumers of electricity. The working group further proposes that the Ministry of Trade and Industry would look into development of the meter-reading requirements, so that they would, for their part, create the conditions for price flexibility in power consumption and for new sales products of electricity. In addition, tightening of the hourly metering requirement related to the

  11. The formation of group norms in computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    The formation of group norms in computer-mediated communication (CMC) was examined among students who used e-mail as part of a course. A network analysis of group structures revealed that (a) content and form of communication is normative, group norms defining communication patterns within groups,

  12. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  13. A Cluster Based Group Signature Mechanism For Secure Vanet Communication

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2015-08-01

    Full Text Available Vehicular adhoc network is one of the recent area of research to administer safety to human lives controlling of messages and in disposal of messages to users and passengers. VANETs allows communication of moving vehicular nodes. Movement of nodes leads in changing network size and scenario. Whenever a new node joins the network there is a threat of malicious node attack. So we need an environment that is secure and trust worthy. Therefore a new cluster based secure technique is proposed where cluster head is responsible for providing communication between the vehicular nodes. Performance parameters used in this paper are message drop ratio packet delay ratio and verification time.

  14. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  15. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  16. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  17. Cyber Security: Big Data Think II Working Group Meeting

    Science.gov (United States)

    Hinke, Thomas; Shaw, Derek

    2015-01-01

    This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.

  18. Network formation under heterogeneous costs: The multiple group model

    NARCIS (Netherlands)

    Kamphorst, J.J.A.; van der Laan, G.

    2007-01-01

    It is widely recognized that the shape of networks influences both individual and aggregate behavior. This raises the question which types of networks are likely to arise. In this paper we investigate a model of network formation, where players are divided into groups and the costs of a link between

  19. Stepfamily Education: Benefits of a Group-Formatted Intervention

    Science.gov (United States)

    Skogrand, Linda; Torres, Eliza; Higginbotham, Brian J.

    2010-01-01

    This program evaluation was conducted by interviewing 40 low-income participants in a relationship education (RE) program for stepfamilies to determine specific benefits of a group-formatted intervention. The benefits that were most often identified were learning from others and having personal stepfamily challenges normalized. Participants also…

  20. A New Group-Formation Method for Student Projects

    Science.gov (United States)

    Borges, Jose; Dias, Teresa Galvao; Cunha, Joao Falcao E.

    2009-01-01

    In BSc/MSc engineering programmes at Faculty of Engineering of the University of Porto (FEUP), the need to provide students with teamwork experiences close to a real world environment was identified as an important issue. A new group-formation method that aims to provide an enriching teamwork experience is proposed. Students are asked to answer a…

  1. Acritarchs of the Ediacaran Frecheirinha Formation, Ubajara Group, Northeastern Brazil

    Directory of Open Access Journals (Sweden)

    Leticia Chiglino

    2015-06-01

    Full Text Available We report for the first time the occurrence of organic-walled microfossils in Ediacaran limestones and marls of the Frecheirinha Formation, Ubajara Group, and the first Precambrian acritarchs so far reported for northeastern Brazil. The assemblage of the Frecheirinha Formation represents a low-diversity microflora comprising Leiosphaeridia, Lophosphaeridium and subordinated Bavlinella (=Sphaerocongregus. Their thermal alteration index (TAI between 4+ and 5, suggests metamorphic temperatures exceeding 200-250°C. Higher temperatures are probably related to intruding granitic plutons (Meruoca, Mucambo. Reported δ13C values of carbonates of -3.5 ‰ VPDB (Vienna-Peedee Belemnite at the base, passing up section into a positive plateau of up to +3.7 ‰, and corresponding 87Sr/86Sr values between 0.7075 and 0.7080 suggest an Ediacaran age. The acritarch assemblage is comparable to the Late Ediacaran Leiosphere Palynoflora (LELP or Kotlin-Rovno assemblage, in broad agreement with chemostratigraphic data. Macrofossils belonging to the Ediacara fauna were reported from the overlying Jaibaras Group, which would constrain even further the depositional age of the Frecheirinha Formation to within ca. 575-555 Ma. A more comprehensive palynological study of the Frecheirinha Formation is necessary to confirm this age assignment.

  2. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  3. solving the cell formation problem in group technology

    Directory of Open Access Journals (Sweden)

    Prafulla Joglekar

    2001-01-01

    Full Text Available Over the last three decades, numerous algorithms have been proposed to solve the work-cell formation problem. For practicing manufacturing managers it would be nice to know as to which algorithm would be most effective and efficient for their specific situation. While several studies have attempted to fulfill this need, most have not resulted in any definitive recommendations and a better methodology of evaluation of cell formation algorithms is urgently needed. Prima facie, the methodology underlying Miltenburg and Zhang's (M&Z (1991 evaluation of nine well-known cell formation algorithms seems very promising. The primary performance measure proposed by M&Z effectively captures the objectives of a good solution to a cell formation problem and is worthy of use in future studies. Unfortunately, a critical review of M&Z's methodology also reveals certain important flaws in M&Z's methodology. For example, M&Z may not have duplicated each algorithm precisely as the developer(s of that algorithm intended. Second, M&Z's misrepresent Chandrasekharan and Rajagopalan's [C&R's] (1986 grouping efficiency measure. Third, M&Z's secondary performance measures lead them to unnecessarily ambivalent results. Fourth, several of M&Z's empirical conclusions can be theoretically deduced. It is hoped that future evaluations of cell formation algorithms will benefit from both the strengths and weaknesses of M&Z's work.

  4. THE FORMATION OF CONSCIENCE AND MANAGEMENT GROUPS IN ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Neisa Maria, Martins da Cunha

    2010-01-01

    Full Text Available This paper presents theoretical proposals, as the Theory of Human Relations, especially the Theory of Group Dynamics and the Conscience Formation, which promote understanding and support for the conduct of the leaders in team management, aiming at a route suitable for questions, reflections, enabling new perceptions of self-consciousness, as Hegel says. It is worth highlighting that through these considerations, it becomes possible to conduct more realistic impacts triggered in the organizational culture, as from a better management of interpersonal relationships within teams, these teams have a training goal or not.

  5. Eocene Yegua Formation (Claiborne group) and Jackson group lignite deposits of Texas

    Science.gov (United States)

    Hook, Robert W.; Warwick, Peter D.; Swanson, Sharon M.; Hackley, Paul C.; Warwick, Peter D.; Karlsen, Alexander K.; Merrill, Matthew D.; Valentine, Brett J.

    2011-01-01

    The lignite deposits within the upper Eocene Yegua Formation (Claiborne Group) and the overlying Jackson Group are among the coal resources that were not quantitatively assessed as part of the U.S. Geological Survey's (USGS) National Coal Resource Assessment (NCRA) program in the Gulf Coastal Plain coal province. In the past, these lignite-bearing stratigraphic units often have been evaluated together because of their geographic and stratigraphic proximity (Fisher, 1963; Kaiser, 1974; Kaiser et al., 1980; Jackson and Garner, 1982; Kaiser, 1996) (Figures 1, 2). The term “Yegua-Jackson trend“ is used informally herein for the lignite-bearing outcrops of these Late Eocene deposits in Texas. Lignite beds in the Yegua-Jackson trend generally are higher both in ash yield and sulfur content than those of the underlying Wilcox Group (Figure 2). Recent studies (Senkayi et al., 1987; Ruppert et al., 1994; Warwick et al., 1996, 1997) have shown that some lignite beds within the Yegua-Jackson trend contain partings of volcanic ash and host elevated levels of trace elements that have been identified as potentially hazardous air pollutants (HAPs) in the United States Clean Air Amendments of 1990. Lignite beds within the Yegua Formation are thin (less than or equal to 6 ft) and laterally discontinuous in comparison with most Wilcox Group deposits (Ayers, 1989a); in contrast, the Jackson Group lignite beds range up to 12 ft in total thickness and are relatively continuous laterally, extending nearly 32 mi along strike.

  6. Socio-philosophical preconditions of formation of the concept of security in protosociology

    Directory of Open Access Journals (Sweden)

    L. V. Kalashnikova

    2016-08-01

    The development of the theory of security is impossible without taking into account the foundations of social and philosophical heritage in this area, which is often out of sight of researchers. Socio-philosophical prerequisites of security concept creates the necessary conditions for the formation of general ideas about it as an objective reality, the study of which with the use of scientific and special methods of knowledge allows us to formulate the basic laws, scientific system of safety management principles that will ensure the safe existence of the person, the effective functioning of society and the state.

  7. EU-US standards harmonization task group report : feedback to standards development organizations - security

    Science.gov (United States)

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  8. 26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation...

  9. Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    2009-01-01

    scheme with no time synchronization requirements. The scheme decreases the number of key updates by providing them on an as needed basis according to the amount of network traffic. We evaluate the CC2420 radio security mechanism and show how to use it as a basis to implement secure group communication......A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They often are deployed in hostile environments...... creating a demand for encryption and authentication of the messages sent between them. Due to severe resource constraints on the sensor nodes, efficient key distribution schemes and secure communication protocols with low overhead are desired. In this paper we present an asynchronous group key distribution...

  10. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  11. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Alagappa, M.

    1991-01-01

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  12. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  13. SOCIAL CAPITAL AS THE BASIS FOR THE FORMATION OF SOCIO-ECONOMIC SECURITY IN RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Andrii Sukhostavets

    2017-09-01

    Full Text Available Social capital is the basis for the definition of the future concept of rural areas management. Therefore, one of the most important tasks is to determine the various factors of existence, development, and formation of social capital. One of these factors is the security of rural areas and the definition of how social capital affects it. The analysis of the available scientific works in various areas reveals the lack of consensus in the definition of the category “socio-economic security of rural areas”. This is due to the fact that the definition of social and economic security of rural areas is identified with such concepts as the ability to provide resistance to various internal and external environmental influences. The purpose of the study is to determine the nature of social capital, as well as to study its impact on the socio-economic security of the state. The methodology of the research is based on the monographic method, the method of dialectic cognition, the scenario methods used to find the optimal scenario implementation option; SWOT-analysis is used to assess the positive or negative impact of social capital on the socio-economic security of rural areas. Understanding the essence of socio-economic security has led to the conclusion that it consists of economic, social, environmental and other types of security. The term “social security” in the understanding of researchers usually has two interpretations: traditional (absence of threats to the society and alternative (absence of threats from the society. It is proved that the social security of the region should be focused on ensuring primarily human rights and freedoms, namely, personal, political, social, economic, cultural, environmental, and family ones. Social and economic security should also provide social standards and guarantees, as well as norms. The economic basis of the security of rural areas is manifested in the development of market relations, infrastructure

  14. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  15. The Poverty of Population and its Impact on Formation of Food Security

    Directory of Open Access Journals (Sweden)

    Pchelianska Halyna O.

    2017-08-01

    Full Text Available The article is aimed at studying the causes of poverty, its negative manifestations, identifying the impact of poverty, determining its impact on food security, and finding ways to overcome it. It has been determined that the structural causes of poverty are considered to be the general macroeconomic and political living conditions of population. The individual approach implies that human poverty is influenced by both the subjective (family, education, skills, job availability or absence and the institutional factors. The author characterizes the economic, social, and political consequences of poverty, their impact on food security. The impact of structural factors on the level of poverty in Ukraine was analyzed. The article explores the level of poverty in different categories of households, i.e.: households in rural and urban areas, with and without children. It has been proven that the level of poverty affects the formation of household food security. The main directions for overcoming poverty and improving food security have been proposed.

  16. Group Supervision in Psychotherapy. Main Findings from a Swedish Research Project on Psychotherapy Supervision in a Group Format

    Science.gov (United States)

    Ogren, Marie-Louise; Sundin, Eva C.

    2009-01-01

    Psychotherapy supervision is considered crucial for psychotherapists in training. During the last decades, group supervision has been a frequently used format in many countries. Until recently, very few studies had evaluated the small-group format for training of beginner psychotherapists and psychotherapy supervisors. This article aims to…

  17. The system of Collective Security of the Russian Federation in the format of CSTO and preconditions of its creation

    Directory of Open Access Journals (Sweden)

    Gontar Sergey Mikhailovich

    2013-11-01

    Full Text Available The article deals with the essence of the security of the States included in the Collective Security Treaty Organization. The author gives the definition to the system of collective security in the CSTO. The main intergovernmental bodies of the Organization and the structure of the forces and means of the CSTO collective security system are outlined. The author enumerates the main sources of a military threat and threats to the national security of the Russian Federation arising at the turn of the XXI century, as well as peculiarities of their arising and development. The prerequisites for a system of collective security of the Russian Federation in the format of CSTO are identified. On the basis of the conducted research the author proposes the basic directions of activity of the Russian leadership in the field of development of the CSTO as an integral part of Eurasian security.

  18. Security of Gas Supply in the Countries of the Visegrád Group

    Directory of Open Access Journals (Sweden)

    Michał Tarnawski

    2015-12-01

    Full Text Available In spite of efforts on the part of the European Union to promote renewable sources of energy, conventional resources such as oil, natural gas and coal still dominate in individual EU energy mixes. With the rising costs of resources, their uneven distribution and limited supply, each state is busy trying to ensure its energy security. Secure and stable supply of energy resources has becoming the main preoccupation, especially in the countries of Central and Eastern Europe. Over the recent years, the Visegrád Group states have made particularly intensive efforts to ensure their supply of natural gas. The unstable political situation in the east of Europe as well as changes in natural gas markets (shale gas revolution in the USA, increased importance of LNG gave rise to new challenges when it comes to ensuring gas security, but also new opportunities to become independent of eastern imports. It is precisely the fact of being dependent on natural gas imported from Russia that determines the situation of Visegrád Group states. The present paper tries to analyse the situation in Poland, the Czech Republic, Slovakia and Hungary in terms of security of their natural gas supply.

  19. A Framework for Semantic Group Formation in Education

    Science.gov (United States)

    Ounnas, Asma; Davis, Hugh C.; Millard, David E.

    2009-01-01

    Collaboration has long been considered an effective approach to learning. However, forming optimal groups can be a time consuming and complex task. Different approaches have been developed to assist teachers allocate students to groups based on a set of constraints. However, existing tools often fail to assign some students to groups creating a…

  20. Cognitive Behavior Therapy: A Comparison of Group and Individual Formats.

    Science.gov (United States)

    Shaffer, Carolyn S.; And Others

    The relative efficacy of both group and individual cognitive behavior therapeutic approaches in treating anxiety and depression are evaluated and then compared to an interpersonal group therapy approach. The two major hypotheses are that group cognitive behavior therapy is at least as effective as individual cognitive behavior therapy, and that…

  1. The formation of heterodimers by vancomycin group antibiotics

    DEFF Research Database (Denmark)

    Staroske, T; O'Brien, DP; Jørgensen, Thomas J. D.

    2000-01-01

    The formation of heterodimers in mixtures of glycopeptide antibiotics has been detected by electrospray ionization mass spectrometry (ESI-MS), and dimerization constants have been determined. By using NMR spectroscopy, it has been shown that these heterodimers indeed exist in aqueous solution...

  2. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  3. Dwarf Spheroidal Satellite Formation in a Reionized Local Group

    OpenAIRE

    Milosavljevic, Milos; Bromm, Volker

    2013-01-01

    Dwarf spheroidal satellite galaxies have emerged a powerful probe of small-scale dark matter clustering and of cosmic reionization. They exhibit structural and chemical continuity with dwarf irregular galaxies in the field and with spheroidal galaxies in high-density environments. By combining empirical constraints derived for star formation at low gas column densities and metallicities in the local universe with a model for dark matter and baryonic mass assembly, we provide an analytical des...

  4. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  5. Multi-Aspect Group Formation using Facility Location Analysis

    NARCIS (Netherlands)

    Neshati, Mahmood; Beigy, Hamid; Hiemstra, Djoerd

    2012-01-01

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a given multi-aspect task/project. Each task needs a diverse set of skills and the group of assigned experts should be able to collectively cover all required aspects of the task. We consider three

  6. The Quality of Maternal Secure-Base Scripts Predicts Children's Secure-Base Behavior at Home in Three Sociocultural Groups

    Science.gov (United States)

    Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan

    2007-01-01

    The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…

  7. Spontaneous formation of dynamical groups in an adaptive networked system

    International Nuclear Information System (INIS)

    Li Menghui; Guan Shuguang; Lai, C-H

    2010-01-01

    In this work, we investigate a model of an adaptive networked dynamical system, where the coupling strengths among phase oscillators coevolve with the phase states. It is shown that in this model the oscillators can spontaneously differentiate into two dynamical groups after a long time evolution. Within each group, the oscillators have similar phases, while oscillators in different groups have approximately opposite phases. The network gradually converts from the initial random structure with a uniform distribution of connection strengths into a modular structure that is characterized by strong intra-connections and weak inter-connections. Furthermore, the connection strengths follow a power-law distribution, which is a natural consequence of the coevolution of the network and the dynamics. Interestingly, it is found that if the inter-connections are weaker than a certain threshold, the two dynamical groups will almost decouple and evolve independently. These results are helpful in further understanding the empirical observations in many social and biological networks.

  8. An Ontology Engineering Approach to the Realization of Theory-Driven Group Formation

    Science.gov (United States)

    Isotani, Seiji; Inaba, Akiko; Ikeda, Mitsuru; Mizoguchi, Riichiro

    2009-01-01

    One of the main difficulties during the design of collaborative learning activities is adequate group formation. In any type of collaboration, group formation plays a critical role in the learners' acceptance of group activities, as well as the success of the collaborative learning process. Nevertheless, to propose both an effective and…

  9. Cooperation during cultural group formation promotes trust towards members of out-groups.

    Science.gov (United States)

    Pan, Xiaofei Sophia; Houser, Daniel

    2013-07-07

    People often cooperate with members of their own group, and discriminate against members of other groups. Previous research establishes that cultural groups can form endogenously, and that these groups demonstrate in-group favouritism. Given the presence of cultural groups, the previous literature argues that cultural evolution selects for groups that exhibit parochial altruism. The source of initial variation in these traits, however, remains uninformed. We show here that a group's economic production environment may substantially influence parochial tendencies, with groups formed around more cooperative production (CP) displaying less parochialism than groups formed around more independent production (IP) processes. Participants randomized into CP and IP production tasks formed cultural groups, and subsequently played hidden-action trust games with in-group and out-group trustees. We found CP to be associated with significantly greater sharing and exchanging behaviours than IP. In trust games, significant parochial altruism (in-group favouritism combined with out-group discrimination) was displayed by members of IP groups. By contrast, members of CP groups did not engage in either in-group favouritism or out-group discrimination. Further, we found the absence of out-group discrimination in CP to persist even following 'betrayal'. Finally, belief data suggest that members of CP are not more intrinsically generous than IP members, but rather more likely to believe that out-group trustees will positively reciprocate. Our results have important implications for anyone interested in building cooperative teams, and shed new light on connections between culture and cooperation.

  10. Cultural Differences in Alliance Formation during Group Supervision.

    Science.gov (United States)

    Carter, John W.; Pak, Jenny H.; Goodyear, Rodney K.

    Study tested whether general differences between Asian and European-American cultures (interdependent vs. independent orientation, levels of self-disclosure and conflict in social relationships) would have an effect on the supervisory process of counseling trainees. On the context of weekly group supervision, first-year counseling trainees were…

  11. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  12. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  13. Community Savings Groups, Financial Security, and HIV Risk Among Female Sex Workers in Iringa, Tanzania.

    Science.gov (United States)

    Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna

    2018-02-24

    This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.

  14. Fixed geometric formation structure in formation control problem for group of robots with dynamically changing number of robots in the group

    Directory of Open Access Journals (Sweden)

    N. S. Morozova

    2015-01-01

    Full Text Available The article considers a problem of the decentralization-based approach to formation control of a group of agents, which simulate mobile autonomous robots. The agents use only local information limited by the covering range of their sensors. The agents have to build and maintain the formation, which fits to the defined target geometric formation structure with desired accuracy during the movement to the target point. At any point in time the number of agents in the group can change unexpectedly (for example, as a result of the agent failure or if a new agent joins the group.The aim of the article is to provide the base control rule, which solves the formation control problem, and to develop its modifications, which provide the correct behavior in case the agent number in the group is not equal to the size of the target geometric formation structure. The proposed base control rule, developed by the author, uses the method of involving virtual leaders. The coordinates of the virtual leaders and also the priority to follow the specific leader are calculated by each agent itself according to specific rules.The following results are presented in the article: the base control rule for solving the formation control problem, its modifications for the cases when the number of agents is greater/less than the size of the target geometric formation structure and also the computer modeling results proving the efficiency of the modified control rules. The specific feature of the control rule, developed by the author, is that each agent itself calculates the virtual leaders and each agent performs dynamic choice of the place within the formation (there is no predefined one-to-one relation between agents and places within the geometric formation structure. The results, provided in this article, can be used in robotics for developing control algorithms for the tasks, which require preserving specific relational positions among the agents while moving. One of the

  15. FOREIGN EXPERIENCE OF THE FORMATION OF INFORMATION SECURITY CULTURE IN SOCIETY

    Directory of Open Access Journals (Sweden)

    A. A. Malyuk

    2016-12-01

    Full Text Available In the context of ever increasing information dependence of all spheres of activity of the company reliability and dependability of information and communication technologies (ICT, quality of information, which is used by members of the information society, saving secrets is of paramount importance. Users must trust all information services they use. Otherwise, the consequences for society and each individual can be simply disastrous. Thus, one of the main problems of the development of the information society is to ensure the information security of the individual, society and state. In order to successfully resist the flow of threats and challenges, each member of the information society must have a certain minimum knowledge, culture and appropriate information to be prepared for an active struggle for the purity of the various types of ICT cyber-hawks, cybercriminals, cyber-terrorists and just cyber-bullies. At the same time, as shown by statistics and sociological research, while rapidly increasing the level of the use of global information and communication networks the level of information literacy of users and their information culture is extremely low. Only about 10 percent of people are more or less aware of the dangers they face while working on the Internet, or they (unwillingly is subjected to its correspondents. Thus, today the key issue of the Information Society becomes the formation of information culture of users and, above all, raising their awareness in this area. Analysis of approaches and expertise to solve this problem (especially overseas is the subject of this article. The conceptual and substantive plans for the material of the article is based on a UN General Assembly resolution that approved in December 2002 the principles of formation of global culture of cybersecurity

  16. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  17. Meteorological Support Interface Control Working Group (MSICWG) Instrumentation, Data Format, and Networks Document

    Science.gov (United States)

    Brenton, James; Roberts, Barry C.

    2017-01-01

    The purpose of this document is to provide an overview of instrumentation discussed at the Meteorological Interface Control Working Group (MSICWG), a reference for data formats currently used by members of the group, a summary of proposed formats for future use by the group, an overview of the data networks of the group's members. This document will be updated as new systems are introduced, old systems are retired, and when the MSICWG community necessitates a change to the formats. The MSICWG consists of personnel from the National Aeronautics and Space Administration (NASA) Kennedy Space Center (KSC), NASA Marshall Space Flight Center (MSFC), NASA Johnson Space Center (JSC), National Oceanic and Atmospheric Administration National Weather Service Spaceflight Meteorology Group (SMG), and the United States Air Force (USAF) 45th Space Wing and Weather Squadron. The purpose of the group is to coordinate the distribution of weather related data to support NASA space launch related activities.

  18. A nitrous acid biosynthetic pathway for diazo group formation in bacteria.

    Science.gov (United States)

    Sugai, Yoshinori; Katsuyama, Yohei; Ohnishi, Yasuo

    2016-02-01

    Although some diazo compounds have bioactivities of medicinal interest, little is known about diazo group formation in nature. Here we describe an unprecedented nitrous acid biosynthetic pathway responsible for the formation of a diazo group in the biosynthesis of the ortho-diazoquinone secondary metabolite cremeomycin in Streptomyces cremeus. This finding provides important insights into the biosynthetic pathways not only for diazo compounds but also for other naturally occurring compounds containing nitrogen-nitrogen bonds.

  19. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  20. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  1. Risk-matching behavior in microcredit group formation: evidence from northern Ethiopia

    NARCIS (Netherlands)

    Berhane Tesfay, G.; Gardebroek, C.; Moll, H.A.J.

    2009-01-01

    Theoretical models on group lending assume the formation of groups of homogenous risk types. Recent theoretical and empirical findings challenge this view arguing that when markets for insurance are missing, risk homogeneity may not hold any more and risk heterogeneity can be the optimal outcome.

  2. Securing recruitment and obtaining informed consent in minority ethnic groups in the UK

    Directory of Open Access Journals (Sweden)

    Roy Tapash

    2008-03-01

    Full Text Available Abstract Background Previous health research has often explicitly excluded individuals from minority ethnic backgrounds due to perceived cultural and communication difficulties, including studies where there might be language/literacy problems in obtaining informed consent. This study addressed these difficulties by developing audio-recorded methods of obtaining informed consent and recording data. This report outlines 1 our experiences with securing recruitment to a qualitative study investigating alternative methods of data collection, and 2 the development of a standardised process for obtaining informed consent from individuals from minority ethnic backgrounds whose main language does not have an agreed written form. Methods Two researchers from South Asian backgrounds recruited adults with Type 2 diabetes whose main language was spoken and not written, to attend a series of focus groups. A screening tool was used at recruitment in order to assess literacy skills in potential participants. Informed consent was obtained using audio-recordings of the patient information and recording patients' verbal consent. Participants' perceptions of this method of obtaining consent were recorded. Results Recruitment rates were improved by using telephone compared to face-to-face methods. The screening tool was found to be acceptable by all potential participants. Audio-recorded methods of obtaining informed consent were easy to implement and accepted by all participants. Attrition rates differed according to ethnic group. Snowballing techniques only partly improved participation rates. Conclusion Audio-recorded methods of obtaining informed consent are an acceptable alternative to written consent in study populations where literacy skills are variable. Further exploration of issues relating to attrition is required, and a range of methods may be necessary in order to maximise response and participation rates.

  3. Field-based description of rhyolite lava flows of the Calico Hills Formation, Nevada National Security Site, Nevada

    Science.gov (United States)

    Sweetkind, Donald S.; Bova, Shiera C.

    2015-01-01

    Contaminants introduced into the subsurface of Pahute Mesa, Nevada National Security Site, by underground nuclear testing are of concern to the U.S. Department of Energy and regulators responsible for protecting human health and safety. The potential for contaminant movement away from the underground test areas at Pahute Mesa and into the accessible environment is greatest by groundwater transport through fractured volcanic rocks. The 12.9 Ma (mega-annums, million years) Calico Hills Formation, which consists of a mixture of rhyolite lava flows and intercalated nonwelded and bedded tuff and pyroclastic flow deposits, occurs in two areas of the Nevada National Security Site. One area is north of the Rainier Mesa caldera, buried beneath Pahute Mesa, and serves as a heterogeneous volcanic-rock aquifer but is only available to study through drilling and is not described in this report. A second accumulation of the formation is south of the Rainier Mesa caldera and is exposed in outcrop along the western boundary of the Nevada National Security Site at the Calico Hills near Yucca Mountain. These outcrops expose in three dimensions an interlayered sequence of tuff and lava flows similar to those intercepted in the subsurface beneath Pahute Mesa. Field description and geologic mapping of these exposures described lithostratigraphic variations within lava flows and assisted in, or at least corroborated, conceptualization of the rhyolite lava-bearing parts of the formation.

  4. Experimental and Kinetic Investigation of the Influence of OH Groups on NOX Formation

    KAUST Repository

    Bohon, Myles

    2016-05-04

    This work investigates the influence of one or more OH groups present on the fuel molecule and the resultant formation of NOX emissions. Combustion of oxygenated fuels has been increasing globally and such fuels offer significant potential in the reduction of pollutant emissions. One such emission class is the oxides of nitrogen, which typically form through a combination of two regimes: the thermal and non-thermal mechanisms. While thermal NO formation can be reduced by lowering the combustion temperature, non-thermal NO formation is coupled to the fuel chemistry. An experimental and computational investigation of NOX formation in three different burner configurations and under a range of equivalence ratios and temperature regimes explored the differences in NO formation. Measurements of temperature profiles and in-flame species concentrations, utilizing both probed and non-intrusive laser based techniques, allowed for the investigation of NO formation through non-thermal pathways and the differences that exist between fuels with varying numbers of OH groups. The first burner configuration was composed of a high swirl liquid spray burner with insulted combustion chamber walls designed specifically for the combustion of low energy density fuels. In this system the combustion of alcohols and glycerol (the largest by-product of biodiesel production), along with other fuels with multiple hydroxyl groups, was studied. Measurements of the mean flame temperature and exhaust gas measurements of NOX showed significant reductions in non-thermal NO concentrations with increasing numbers of OH groups. An accompanying modeling study and detailed reaction path analysis showed that fuel decomposition pathways through formaldehyde were shown a preference due to the presence of the OH groups which resulted in reduced contributions to the hydrocarbon radical pools subsequent reductions to the Prompt NO mechanism. Two burner configurations with reduced dimensionality facilitated

  5. FORMATION OF THE CONTENT OF THE PROJECT OF ORGANIZATION OF SECURITY SYSTEMS IN HOTEL BUSINESS

    Directory of Open Access Journals (Sweden)

    Антон Іванович РОГОВИЙ

    2015-05-01

    Full Text Available The article identified and analyzed features of the project management in systems of creating security systems for security systems for the enterprise of hotel business. We have identified the main technical means, which should provide maximum protection of people and infrastructure of hotels. In the article revealed the criteria that should guide the manager in the selection of one or other technical means. In summery we highlighted works, which have to be included in the content of the project of organization of complex security system of companies in the hotel business.

  6. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  7. System of economics' security management in economic activity of meat processing enterprises formation

    OpenAIRE

    Iryna Sosnovska

    2015-01-01

    This article is devoted to creation of economics' security management system production and economic activity of meat current processing enterprises. The article reflects research results of various scientists scientific works regarding interpretation of economic security system and shows the lack of this concept single interpretation. There are summarized observation of current activities of meat processing plants specifics as a conclusion there are a large number of different programs and c...

  8. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    Science.gov (United States)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  9. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  10. Format of medical order sheet improves security of antibiotics prescription: The experience of an intensive care unit.

    Science.gov (United States)

    Wasserfallen, Jean-Blaise; Bütschi, Anne-Joëlle; Muff, Patrik; Biollaz, Jérôme; Schaller, Marie-Denise; Pannatier, André; Revelly, Jean-Pierre; Chiolero, René

    2004-03-01

    To assess whether formatting the medical order sheet has an effect on the accuracy and security of antibiotics prescription. Prospective assessment of antibiotics prescription over time, before and after the intervention, in comparison with a control ward. The medical and surgical intensive care unit (ICU) of a university hospital. All patients hospitalized in the medical or surgical ICU between February 1 and April 30, 1997, and July 1 and August 31, 2000, for whom antibiotics were prescribed. Formatting of the medical order sheet in the surgical ICU in 1998. Compliance with the American Society of Hospital Pharmacists' criteria for prescription safety was measured. The proportion of safe orders increased in both units, but the increase was 4.6 times greater in the surgical ICU (66% vs. 74% in the medical ICU and 48% vs. 74% in the surgical ICU). For unsafe orders, the proportion of ambiguous orders decreased by half in the medical ICU (9% vs. 17%) and nearly disappeared in the surgical ICU (1% vs. 30%). The only missing criterion remaining in the surgical ICU was the drug dose unit, which could not be preformatted. The aim of antibiotics prescription (either prophylactic or therapeutic) was indicated only in 51% of the order sheets. Formatting of the order sheet markedly increased security of antibiotics prescription. These findings must be confirmed in other settings and with different drug classes. Formatting the medical order sheet decreases the potential for prescribing errors before full computerized prescription is available.

  11. Security of supply on the electricity market. Report of a working group

    International Nuclear Information System (INIS)

    2000-06-01

    The shift from a regulated electricity market to open competitive electricity markets has been fast in Finland. Finland together with Sweden, Norway and partly also Denmark form a common market area where the internal trade in electricity has markedly increased. Partly as a result of this, the share of net import in our electricity consumption has increased. The low price level on the Nordic market has contributed to an increased import of electricity to Finland. The generally clearly increased production of hydroelectric power together with the functioning principles of the Nordic electricity exchange have lead to a situation where the competitive position of indigenous electricity, especially that from condensing power, has become more difficult. In Finland, several condensing power plants have, accordingly, been closed and the trend seems to continue. Similar development has taken place also in Sweden and Denmark. In the current market situation, the decisions upon investment in the construction of new power plants have further been postponed until later. Because the economic interest of the market players in maintaining slow reserve capacity has been reduced in the current market situation, there is concern whether the market is able to guarantee the security of electricity supply in all circumstances with varying demand taking also account of possible long-term malfunction of power plants or disturbances in the import of electricity or gas. Sweden and Norway are besides Finland net importers of electricity in normal hydrological years. Of the Nordic countries, only Denmark is able to balance the Nordic demand for electricity in case of a poor hydrological year. The price level on the electricity market is expected to remain low still for years. Building new capacity during the coming few years seems unlikely in all Nordic countries. The increased consumption of electricity as a result of economic growth and the reduction in capacity will however lead to a

  12. Econometric analyses of microfinance credit group formation, contractual risks and welfare impacts in Northern Ethiopia

    NARCIS (Netherlands)

    Berhane Tesfay, G.

    2009-01-01

    Key words
    Microfinance, joint liability, contractual risk, group formation, risk-matching, impact evaluation, Panel data econometrics, dynamic panel probit, trend models, fixed-effects, composite counterfactuals, propensity score matching, farm households, Ethiopia.

    Lack of

  13. Group Formation Based on Learning Styles: Can It Improve Students' Teamwork?

    Science.gov (United States)

    Kyprianidou, Maria; Demetriadis, Stavros; Tsiatsos, Thrasyvoulos; Pombortsis, Andreas

    2012-01-01

    This work explores the impact of teacher-led heterogeneous group formation on students' teamwork, based on students' learning styles. Fifty senior university students participated in a project-based course with two key organizational features: first, a web system (PEGASUS) was developed to help students identify their learning styles and…

  14. High Charge Mobility of a Perylene Bisimide Dye with Hydrogen-bond Formation Group

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A perylene bisimide dye covalently bonded with a hydrogen-bond formation group of 1,3, 5-triazine-2, 4-diamine has been synthesized. Its casting films show a charge carrier mobility over 10-3 cm2/Vs, which is in the range of the highest values found for other promising charge transport materials suitable for solution processable technique.

  15. Star Formation Histories of Local Group Dwarf Galaxies. (Ludwig Biermann Award Lecture 1996)

    Science.gov (United States)

    Grebel, E. K.

    The star formation histories of dwarf galaxies in the Local Group are reviewed. First the question of Local Group membership is considered based on various criteria. The properties of 31 (36) galaxies are consistent with likely (potential) Local Group membership. To study the star formation histories of these galaxies, a multi-parameter problem needs to be solved: Ages, metallicities, population fractions, and spatial variations must be determined, which depend crucially on the knowledge of reddening and distance. The basic methods for studying resolvable stellar populations are summarized. One method is demonstrated using the Fornax dwarf spheroidal galaxy. A comprehensive compilation of the star formation histories of dwarf irregulars, dwarf ellipticals, and dwarf spheroidals in the Local Group is presented and visualized through Hodge's population boxes. All galaxies appear to have differing fractions of old and intermediate-age populations, and those sufficiently massive and undisturbed to retain and recycle their gas are still forming stars today. Star formation has occurred either in distinct episodes or continuously over long periods of time. Metallicities and enrichment vary widely. Constraints on merger and remnant scenarios are discussed, and a unified picture based on the current knowledge is presented. Primary goals for future observations are: accurate age determinations based on turnoff photometry, detection of subpopulations distinct in age, metallicity, and/or spatial distribution; improved distances; and astrometric studies to derive orbits and constrain past and future interactions.

  16. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Science.gov (United States)

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  17. New polymers containing BF2-benzoylacetonate groups. Synthesis, luminescence, excimer and exciplex formation

    International Nuclear Information System (INIS)

    Fedorenko, Elena V.; Mirochnik, Anatolii G.; Beloliptsev, Anton Yu.

    2017-01-01

    In the present study, a new synthetic method for the functionalization of polystyrene (PS) and (styrene-methyl methacrylate) copolymer has been developed. Using the new method, polymers containing BF 2 -benzoylacetonate groups have been obtained through double acylation by acetic anhydride with boron trifluoride. Luminescence of the produced polymers in solutions and films has been studied. Quantum yields of polymer solution luminescence are significantly higher than those of the low-molecular-weight analog – boron difluoride benzoylacetonate. For the polymer, in which styrene fragments are separated by methyl methacrylate groups, at low concentrations of the polymer in solution one observes the monomer luminescence of BF 2 -benzoylacetonate groups, while at high concentrations – the excimer luminescence. In case of PS-based polymers, in which BF 2 -benzoylacetonate groups and phenyl rings are not separated, in diluted solutions one observes the fluorescence of the intramolecular exciplexes, while at the concentration increase – the luminescence of intermolecular exciplexes. The ability of excimer formation is responsible for the increased photostability of the produced polymers. - Highlights: •Polymers containing BF 2 -benzoylacetonate groups have been synthesized. •Luminescence of the produced polymers in solutions and films has been studied. •Formation of excimers and exciplexes in solution has been revealed. •Formation of excimers in films increases their photostability.

  18. New polymers containing BF{sub 2}-benzoylacetonate groups. Synthesis, luminescence, excimer and exciplex formation

    Energy Technology Data Exchange (ETDEWEB)

    Fedorenko, Elena V., E-mail: gev@ich.dvo.ru [Institute of Chemistry, Far Eastern Branch of the Russian Academy of Sciences, 159, Prosp. 100 letiya Vladivostoka, Vladivostok 690022 (Russian Federation); Mirochnik, Anatolii G.; Beloliptsev, Anton Yu. [Institute of Chemistry, Far Eastern Branch of the Russian Academy of Sciences, 159, Prosp. 100 letiya Vladivostoka, Vladivostok 690022 (Russian Federation)

    2017-05-15

    In the present study, a new synthetic method for the functionalization of polystyrene (PS) and (styrene-methyl methacrylate) copolymer has been developed. Using the new method, polymers containing BF{sub 2}-benzoylacetonate groups have been obtained through double acylation by acetic anhydride with boron trifluoride. Luminescence of the produced polymers in solutions and films has been studied. Quantum yields of polymer solution luminescence are significantly higher than those of the low-molecular-weight analog – boron difluoride benzoylacetonate. For the polymer, in which styrene fragments are separated by methyl methacrylate groups, at low concentrations of the polymer in solution one observes the monomer luminescence of BF{sub 2}-benzoylacetonate groups, while at high concentrations – the excimer luminescence. In case of PS-based polymers, in which BF{sub 2}-benzoylacetonate groups and phenyl rings are not separated, in diluted solutions one observes the fluorescence of the intramolecular exciplexes, while at the concentration increase – the luminescence of intermolecular exciplexes. The ability of excimer formation is responsible for the increased photostability of the produced polymers. - Highlights: •Polymers containing BF{sub 2}-benzoylacetonate groups have been synthesized. •Luminescence of the produced polymers in solutions and films has been studied. •Formation of excimers and exciplexes in solution has been revealed. •Formation of excimers in films increases their photostability.

  19. SOME ASPECTS OF FORMATION OF FINANCIAL-INDUSTRIAL GROUPS IN RUSSIA IN 1990S

    Directory of Open Access Journals (Sweden)

    Сергей Александрович Лутошкин

    2015-12-01

    Full Text Available The article examines the main stages of the financial-industrial groups formation in Russia in the 1990s, analyzes the main premises of these forms of association in the industrial and financial sectors, as well as the mechanism of their creation under conditions of the transitional market economy. The study revealed the main forms of financial and industrial groups in Russia and the fact that they had a national specificity. The author concludes that the distinctive feature was the formation of Russian business groups mostly from the former nomenklatura and Komsomol workers on the basis of pre-existing material base, which largely contributed to their rapid transformation into large concerns. The state did not prevent the creation of industrial and financial corporations, because of receiving financial support in the form of replenishment of the state budget through tax revenues and revival of production through investments in illiquid corporate enterprises.

  20. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  1. Molecularly oriented surface relief formation in polymethacrylates comprising N-benzylideneaniline derivative side groups

    Science.gov (United States)

    Kawatsuki, Nobuhiro; Hosoda, Risa; Kondo, Mizuho; Sasaki, Tomoyuki; Ono, Hiroshi

    2014-12-01

    Molecularly oriented surface relief (SR) formation in polymethacrylates with N-benzylideneaniline (NBA) derivative side groups is investigated by holographic exposure using a 325 nm He-Cd laser. Because the NBA moieties show a photoinduced orientation perpendicular to the polarization of light, polarization holography successfully forms a molecularly oriented SR structure in accordance with the polarization distribution that includes p-polarized components. Although intensity holography induces molecular orientation, it does not generate a satisfactory SR structure. In all the holographic modes, the SR depth depends on the direction of the C=N bonds in the NBA moieties and the photoproducts affect the SR formation ability.

  2. The Ultraviolet and Infrared Star Formation Rates of Compact Group Galaxies: An Expanded Sample

    Science.gov (United States)

    Lenkic, Laura; Tzanavaris, Panayiotis; Gallagher, Sarah C.; Desjardins, Tyler D.; Walker, Lisa May; Johnson, Kelsey E.; Fedotov, Konstantin; Charlton, Jane; Cardiff, Ann H.; Durell, Pat R.

    2016-01-01

    Compact groups of galaxies provide insight into the role of low-mass, dense environments in galaxy evolution because the low velocity dispersions and close proximity of galaxy members result in frequent interactions that take place over extended time-scales. We expand the census of star formation in compact group galaxies by Tzanavaris et al. (2010) and collaborators with Swift UVOT, Spitzer IRAC and MIPS 24 m photometry of a sample of 183 galaxies in 46 compact groups. After correcting luminosities for the contribution from old stellar populations, we estimate the dust-unobscured star formation rate (SFRUV) using the UVOT uvw2 photometry. Similarly, we use the MIPS 24 m photometry to estimate the component of the SFR that is obscured by dust (SFRIR). We find that galaxies which are MIR-active (MIR-red), also have bluer UV colours, higher specific SFRs, and tend to lie in Hi-rich groups, while galaxies that are MIR-inactive (MIR-blue) have redder UV colours, lower specific SFRs, and tend to lie in Hi-poor groups. We find the SFRs to be continuously distributed with a peak at about 1 M yr1, indicating this might be the most common value in compact groups. In contrast, the specific SFR distribution is bimodal, and there is a clear distinction between star-forming and quiescent galaxies. Overall, our results suggest that the specific SFR is the best tracer of gas depletion and galaxy evolution in compact groups.

  3. Formation of the Optimal Investment Portfolio as a Precondition for the Bank’s Financial Security

    Directory of Open Access Journals (Sweden)

    Anna Shapovalova

    2015-01-01

    Full Text Available This article analyses the definition of the bank’s financial security and investment activities. It describes a few types of models of bank’s risks management and the method CAPM, which is chosen for use. In support for the chosen CAPM method, we included the mathematical model that allows elaborating an optimal investment portfolio. The model stands at the basis of this method and a case study of one of Ukrainian banks.

  4. Formation of the Optimal Investment Portfolio as a Precondition for the Bank’s Financial Security

    Directory of Open Access Journals (Sweden)

    Anna Shapovalova

    2016-01-01

    Full Text Available This article analyses the definition of the bank’s financial security and investment activities. It describes a few types of models of bank’s risks management and the method CAPM, which is chosen for use. In support for the chosen CAPM method, we included the mathematical model that allows elaborating an optimal investment portfolio. The model stands at the basis of this method and a case study of one of Ukrainian banks.

  5. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  6. Dinosaur footprint assemblage from the Lower Cretaceous Khok Kruat Formation, Khorat Group, northeastern Thailand

    Directory of Open Access Journals (Sweden)

    Shohei Kozu

    2017-11-01

    Full Text Available The Khok Kruat Formation is the upper part of the Khorat Group, which consists of upper Lower Cretaceous non-marine sedimentary rocks in northeastern Thailand. Many dinosaur footprints have been known from the upper Lower Cretaceous (Aptian–Albian Khok Kruat Formation at the Huai Dam Chum (Tha Uthen site, northeastern Thailand. Approximately 600 tracks occur in thin mudstone layer of the northern part of the outcrop at the Huai Dam Chum track site. Two types of footprints, small-sized theropod and crocodylomorph are imprinted with mud cracks and ripple marks on the thin mud layer. Most of footprints are referred to cf. Asianopodus, and are imprinted by small-sized theropoda, probably ornithomimosauria. Theropod tracks are mainly separated into two groups, Group A and Group B. From ichnological viewpoints, the small-sized theropod track assemblage indicates the herd behaviour and its idiosyncratic group composition. In particular, the histogram of size-frequency measurements of Group A shows the anomalous bimodal distribution. We consider that there are two hypotheses; the first one is due to the male-female difference, and the second is a result of the different growing stage.

  7. Controlling formation of single-molecule junctions by electrochemical reduction of diazonium terminal groups.

    Science.gov (United States)

    Hines, Thomas; Díez-Pérez, Ismael; Nakamura, Hisao; Shimazaki, Tomomi; Asai, Yoshihiro; Tao, Nongjian

    2013-03-06

    We report controlling the formation of single-molecule junctions by means of electrochemically reducing two axialdiazonium terminal groups on a molecule, thereby producing direct Au-C covalent bonds in situ between the molecule and gold electrodes. We report a yield enhancement in molecular junction formation as the electrochemical potential of both junction electrodes approach the reduction potential of the diazonium terminal groups. Step length analysis shows that the molecular junction is significantly more stable, and can be pulled over a longer distance than a comparable junction created with amine anchoring bonds. The stability of the junction is explained by the calculated lower binding energy associated with the direct Au-C bond compared with the Au-N bond.

  8. Geochemistry and source of iron-formation from Guanhaes group, Guanhaes district, Minas Gerais, Brazil

    International Nuclear Information System (INIS)

    Sad, J.H.G.; Chiodi Filho, C.; Magalhaes, J.M.M.; Carelos, P.M.

    1990-01-01

    The Guanhaes district is underlain by metavolcano-sedimentary rocks of the Guanhaes Group, emplaced over an older Archean basement and intruded by granitic bodies. The Guanhaes Group is composed of pelitic, mafic and ultramafic schists at the base; silicate and carbonate facies iron-formation, calcarious schists, calcsilicates rocks and quartzites at the median portion and para-gneisses (meta-graywacks) at the top. Geochemistry of iron-formation suggest a hydrothermal affinity comparable to the hydrothermal sediments flanking East Pacific Rise. Paragenetic studies indicates that the rocks were submited to two metamorphic processes: one of regional character (high-amphibolite facies) and one of themal character (pyroxene-hornfels facies). Chemical analysis, as X-ray and optic spectrography, atomic absorption and plasma spectrography are presented. (author)

  9. Mechanism of trans-vinylene groups formation in the radiolysis of polyethylene and n-alkanes

    International Nuclear Information System (INIS)

    Borzov, S.M.; Sukhov, F.F.; Slovokhotova, N.A.

    1984-01-01

    Infrared spectra of polyethylene and some n-alkanes were studied after their irradiation at 20 K with 1-MeV electrons and subsequent heating to 160 K. The mechanism of trans-vinylene groups formation is suggested, which takes into account the decay of excited states of molecules in primary processes and the intra-chain recombination of free radicals in post-irradiation reactions. (author)

  10. Comparing Web, Group and Telehealth Formats of a Military Parenting Program

    Science.gov (United States)

    2016-06-01

    materials are available upon request: • Online questionnaire for baseline data collection (9 pages) • Online parent survey for time point 1 (69 pages...web-based parenting intervention for military families with school-aged children, we expect to strengthen parenting practices in families and...AWARD NUMBER: W81XWH-14-1-0143 TITLE: Comparing Web, Group and Telehealth Formats of a Military Parenting Program PRINCIPAL INVESTIGATOR

  11. Interacting star clusters in the Large Magellanic Cloud. Overmerging problem solved by cluster group formation

    Science.gov (United States)

    Leon, Stéphane; Bergond, Gilles; Vallenari, Antonella

    1999-04-01

    We present the tidal tail distributions of a sample of candidate binary clusters located in the bar of the Large Magellanic Cloud (LMC). One isolated cluster, SL 268, is presented in order to study the effect of the LMC tidal field. All the candidate binary clusters show tidal tails, confirming that the pairs are formed by physically linked objects. The stellar mass in the tails covers a large range, from 1.8x 10(3) to 3x 10(4) \\msun. We derive a total mass estimate for SL 268 and SL 356. At large radii, the projected density profiles of SL 268 and SL 356 fall off as r(-gamma ) , with gamma = 2.27 and gamma =3.44, respectively. Out of 4 pairs or multiple systems, 2 are older than the theoretical survival time of binary clusters (going from a few 10(6) years to 10(8) years). A pair shows too large age difference between the components to be consistent with classical theoretical models of binary cluster formation (Fujimoto & Kumai \\cite{fujimoto97}). We refer to this as the ``overmerging'' problem. A different scenario is proposed: the formation proceeds in large molecular complexes giving birth to groups of clusters over a few 10(7) years. In these groups the expected cluster encounter rate is larger, and tidal capture has higher probability. Cluster pairs are not born together through the splitting of the parent cloud, but formed later by tidal capture. For 3 pairs, we tentatively identify the star cluster group (SCG) memberships. The SCG formation, through the recent cluster starburst triggered by the LMC-SMC encounter, in contrast with the quiescent open cluster formation in the Milky Way can be an explanation to the paucity of binary clusters observed in our Galaxy. Based on observations collected at the European Southern Observatory, La Silla, Chile}

  12. The time course of perceptual grouping: the role of segregation and shape formation.

    Science.gov (United States)

    Razpurker-Apfeld, Irene; Kimchi, Ruth

    2007-07-01

    The time course of perceptual grouping was examined in two experiments, using a primed matching task. In different conditions, elements were grouped into columns/rows by common lightness, into a shape (triangle/ arrow or square/cross) by common lightness, and into a shape without segregation of elements. The results showed an early and rapid grouping into columns/rows by common lightness and into a shape when no segregation from other elements was involved. Goodness of shape (i.e., triangle/arrow vs. square/cross) had no influence on how early grouping was evident, but the relatively poorer shapes appeared to consolidate with time. In contrast, grouping into a shape that involved segregation and required resolving figure-ground relations between segregated units, as grouping into a shape by common lightness, consumed time, regardless of shape goodness. These results suggest that the time course of grouping varies as a function of the processes involved in it (e.g., segregation and shape formation) and the conditions prevailing for each process.

  13. Stories of People Who Have Attended a Lesbian, Gay, Bisexual and Trans Support Group in a Secure Intellectual Disability Service.

    Science.gov (United States)

    Tallentire, Liz; Smith, Matthew; David, Lee; Roberts, Adam; Bruce; Morrow, Sarah; Withers, Paul; Smith, Ian

    2016-08-31

    This research is about people who have intellectual disabilities and live in a secure hospital. It is about a group of people who meet at a support group. The support group is for people who are lesbian, gay, bisexual or transgender. These people with intellectual disabilities helped with planning, doing, and telling other people about the research. They told their stories about going to the support group. Their stories were joined together into a group story. The story said that the group helped people in lots of different ways. For some people going to the group was difficult at first because it was ?coming out'. This means telling other people you are lesbian, gay, bisexual, or transgender. Then it got easier and people started to feel better about themselves. Then they wanted to help others and this was important in their lives. This group seemed to help people get better. We have given some ideas for setting up other groups and doing more research. © 2016 John Wiley & Sons Ltd.

  14. Rethinking Cysteine Protective Groups: S-Alkylsulfonyl-l-Cysteines for Chemoselective Disulfide Formation.

    Science.gov (United States)

    Schäfer, Olga; Huesmann, David; Muhl, Christian; Barz, Matthias

    2016-12-12

    The ability to reversibly cross-link proteins and peptides grants the amino acid cysteine its unique role in nature as well as in peptide chemistry. We report a novel class of S-alkylsulfonyl-l-cysteines and N-carboxy anhydrides (NCA) thereof for peptide synthesis. The S-alkylsulfonyl group is stable against amines and thus enables its use under Fmoc chemistry conditions and the controlled polymerization of the corresponding NCAs yielding well-defined homo- as well as block co-polymers. Yet, thiols react immediately with the S-alkylsulfonyl group forming asymmetric disulfides. Therefore, we introduce the first reactive cysteine derivative for efficient and chemoselective disulfide formation in synthetic polypeptides, thus bypassing additional protective group cleavage steps. © 2016 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Influence of carboxyl group formation on ammonia adsorption of NiO-templated nanoporous carbon surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Long-Yue [Department of Chemistry, Inha University, 100 Inharo, Nam-gu, Incheon 402-751 (Korea, Republic of); Park, Soo-Jin, E-mail: sjpark@inha.ac.kr [Department of Chemistry, Inha University, 100 Inharo, Nam-gu, Incheon 402-751 (Korea, Republic of)

    2012-11-15

    The scope of this work was to control the surface functional groups of nanoporous carbons (NPs) by oxidizing agents (nitric acid and hydrogen peroxide) treatments and to investigate the relation between carboxyl group and ammonia removal efficiency. The NPs were directly prepared from a cation exchange resin by the carbonization of a mixture with Ni acetate at 900 Degree-Sign C. N{sub 2}/-196 Degree-Sign C adsorption, Boehm's titrations, and X-ray photoelectron spectroscopy (XPS) analyzes were employed to confirm the physicochemical properties of NPs. The ammonia removal efficiency was confirmed by temperature programmed desorption (TPD) technique. In the result, the oxygen content of NPs increased after various treatments and the highest content of carboxyl group formation appeared at a 2:3 volume ratio of HNO{sub 3}/H{sub 2}O{sub 2}. It was also found that the oxidation treatment led to an increase in ammonia removal efficiency of NPs, mainly due to an increase of acid oxygen functional groups (such as carboxyl) on NPs surfaces. -- Graphical abstract: The nanoporous carbons were prepared from an exchange resin by the carbonization of a mixture with Ni acetate for ammonia adsorption. Highlights: Black-Right-Pointing-Pointer The carbons were prepared from an exchange resin by the carbonization of a mixture with Ni acetate. Black-Right-Pointing-Pointer The carbon surfaces were modified with HNO{sub 3}/H{sub 2}O{sub 2} solution at different volume radio. Black-Right-Pointing-Pointer The highest content of carboxyl group formation appeared at a 2:3 volume ratio of HNO{sub 3}/H{sub 2}O{sub 2}. Black-Right-Pointing-Pointer The acid oxygen functional groups (such as carboxyl) on carbon surfaces led to an increase in ammonia adsorption.

  16. Role of protein-bound carbonyl groups in the formation of advanced glycation endproducts.

    Science.gov (United States)

    Liggins, J; Furth, A J

    1997-08-22

    Several mechanisms have been postulated for the formation of advanced glycation endproducts (AGEs) from glycated proteins; they all feature protein-bound carbonyl intermediates. Using 2,4-dinitrophenylhydrazine (DNPH), we have detected these intermediates on bovine serum albumin, lysozyme and beta-lactoglobulin after in vitro glycation by glucose or fructose. Carbonyls were formed in parallel with AGE-fluorophores, via oxidative Maillard reactions. Neither Amadori nor Heyns products contributed to the DNPH reaction. Fluorophore and carbonyl yields were much enhanced in lipid-associated proteins, but both groups could also be detected in lipid-free proteins. When pre-glycated proteins were incubated in the absence of free sugar, carbonyl groups were rapidly lost in a first-order reaction, while fluorescence continued to develop beyond the 21 days of incubation. Another unexpected finding was that not all carbonyl groups were blocked by aminoguanidine, although there was complete inhibition of reactions leading to AGE-fluorescence. It is suggested that carbonyls acting as fluorophore precursors react readily with aminoguanidine, while others are resistant to this hydrazine, possibly because they are involved in ring closure. Factors influencing the relative rates of acyclisation and hydrazone formation are discussed, together with possible implications for antiglycation therapy.

  17. Alliance group formation: enabling and constraining effects of embeddedness and social capital in strategic technology alliance networks

    NARCIS (Netherlands)

    Duysters, G.M.; Lemmens, C.E.A.V.

    2003-01-01

    The role of embeddedness and social capital in the process of alliance group formation in strategic technology alliance networks is examined. In particular, the social mechanisms that enable and enforce alliance group formation is studies. It is argued that the enabling effect of embeddedness during

  18. Chemoselective Methylation of Phenolic Hydroxyl Group Prevents Quinone Methide Formation and Repolymerization During Lignin Depolymerization

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kwang Ho; Dutta, Tanmoy; Walter, Eric D.; Isern, Nancy G.; Cort, John R.; Simmons, Blake A.; Singh, Seema

    2017-03-30

    Chemoselective blocking of the phenolic hydroxyl (Ar-OH) group by methylation was found to suppress secondary repolymerization and charring during lignin depolymerization. Methylation of Ar-OH prevents formation of reactive quinone methide intermediates, which are partly responsible for undesirable secondary repolymerization reactions. Instead, this structurally modified lignin produces more relatively low molecular weight products from lignin depolymerization compared to unmodified lignin. This result demonstrates that structural modification of lignin is desirable for production of low molecular weight phenolic products. This approach could be directed toward alteration of natural lignification processes to produce biomass more amenable to chemical depolymerization.

  19. The role of outsourcing in the mechanism of economic security activities of cluster formations

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2016-01-01

    Full Text Available The article considers the concept of “outsourcing”, “economic safety’, “cluster formation”. Outsourcing is defined as external influences that contribute to the effective operation of the enterprise. The economic essence of "outsourcing" in the research and domestic practice, which has hitherto manifested itself only as a method of attracting temporary workers in the field. On the example of the dairy industry is studied safe operation as sustainable, and competitive Bozrikova their behavior with regard to outsourcing. Studied the differences of the processes of cooperation, subcontracting and clustering. Stated that cooperation and subcontracting are the component parts outsourcing, which covers the process of production or provision of services; the outsourcing justifies: the transfer of technical functions or business processes, and thus part of the risks transferred to the outsourcing provider. An example of adaptive modeling outsourcing, suggesting that in the future, the projected volume of production, processing and sales of dairy products manufactured by the enterprises of dairy industry of the Voronezh region belonging to a cluster will be reduced through the introduction of a mechanism of outsourcing. It proves that the risk of bankruptcy of enterprises on the basis of adaptive models. The application of the mechanism of outsourcing in order to increase the economic security, in particular, such of its functions as the transmission of external organizations not only certain social functions (such as the use of temporary workers, but also the activities of the business processes to optimize all kinds of resources and concentration of efforts on the core activities of each company within the cluster APK. Analysis conducted by the authors suggests: in the future, the projected volume of production, processing and sales of dairy products manufactured by the enterprises of agriculture, dairy production and trade of the Voronezh

  20. Repeated use of computerized case simulations in a test format does not present a security risk.

    Science.gov (United States)

    Lynch, T G; Zadalis, R J; Schneider, P D

    1999-03-01

    Computer-based examination formats permit evaluation of patient care strategies in a realistic context. Because such examinations are complex and difficult to develop, the same case simulations must often be used on multiple occasions. To determine if repeated, serial administration of computerized case simulations influences performance, 8 simulations were administered over 2 consecutive years to 252 third-year medical students at the conclusion of 16 surgical clerkship rotations (8 per year). One-way analyses of variance were used to compare scores across rotations during the year and to compare scores between 2 consecutive academic years. Scheffe pairwise comparisons were used to identify trends within each academic year. The data demonstrate an increase in scores across rotations during the year. There is, however, no difference between scores in successive years. The data are consistent with an increase in knowledge during the course of the year, without evidence that test information transfer influences the performance of successive classes.

  1. Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper

    Science.gov (United States)

    Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  2. Effect of estradiol on planktonic growth, coaggregation, and biofilm formation of the Prevotella intermedia group bacteria.

    Science.gov (United States)

    Fteita, Dareen; Könönen, Eija; Söderling, Eva; Gürsoy, Ulvi Kahraman

    2014-06-01

    Alterations in the quantity and quality of biofilms at gingival margin are considered to play a role in the initiation and development of pregnancy-related gingivitis. Prevotella intermedia sensu lato is able to consume estradiol, the major sex hormone secreted during pregnancy, in the absence of vitamin K. The aim of the study was to examine the effect of estradiol on the planktonic growth, coaggregation, polysaccharide production, and biofilm formation of the P. intermedia group bacteria, namely P. intermedia, Prevotella nigrescens, and Prevotella pallens. In all experiments, the type strain (ATCC) and a clinical strain (AHN) of P. intermedia, P. nigrescens, and P. pallens were incubated with the concentrations of 0, 30, 90, and 120 nmol/L of estradiol. Planktonic growth was assessed by means of the colony forming unit method, while coaggregation and biofilm formation were assessed by spectrophotometric methods. In the determination of protein and polysaccharide levels, the Bradford and phenol-sulfuric acid methods were used, respectively. P. pallens AHN 9283 and P. nigrescens ATCC 33563 increased their numbers at planktonic stage with increasing estradiol concentrations. In 48-h biofilm tests, elevated protein levels were found for both strains of P. intermedia, and the strains P. nigrescens ATCC 33563 and P. pallens AHN 9283 in the presence of estradiol. The P. intermedia strains also increased the levels of polysaccharide formation in the biofilm. Coaggregation of the P. intermedia group organisms with Fusobacterium nucleatum was enhanced only in P. intermedia AHN 8290. In conclusion, our in vitro experiments indicate that estradiol regulates planktonic growth, coaggregation, polysaccharide production, and biofilm formation characteristics of P. intermedia, P. nigrescens, and P. pallens differently. These results may, at least partly, explain the differences seen in their contribution to the pathogenesis of pregnancy-related gingivitis

  3. The effect of oxytocin on group formation and strategic thinking in men.

    Science.gov (United States)

    Aydogan, Gökhan; Jobst, Andrea; Loy, Fabian; Dehning, Sandra; Zill, Peter; Müller, Norbert; Kocher, Martin

    2018-04-01

    Decision-making in groups is a remarkable and decisive element of human societies. Humans are able to organize themselves in groups, engage in collaborative decision-making processes and arrive at a binding agreement, even in the absence of unanimous consent. However, the transfer of decision-making autonomy requires a willingness to deliberately expose oneself to the decisions of others. A lack of trust in the abilities of others or of the underlying decision-making process, i.e. public trust, can lead to a breakdown of organizations in political or economic domains. Recent studies indicate that the biological basis of trust on an individual level is related to Oxytocin, an endogenous neuropeptide and hormone, which is also associated with pro-social behavior and positive conflict resolution. However, little is known about the effects of Oxytocin on the inclination of individuals to form or join groups and to deliberately engage in collaborative decision-making processes. Here, we show that intranasal administration of Oxytocin (n = 60) compared to placebo (n = 60) in males causes an adverse effect on the choice for forming groups in the presence of a competitive environment. In particular, Oxytocin negatively affects the willingness to work collaboratively in a p-Beauty contest game, whereas the effect is most pronounced for participants with relatively high strategic sophistication. Since our data provide initial evidence that Oxytocin has a positive effect on strategic thinking and performance in the p-Beauty contest game, we argue that the adverse effect on group formation might be rooted in an enhanced strategic sophistication of participants treated with Oxytocin. Copyright © 2018 Elsevier Inc. All rights reserved.

  4. Project on National Security Reform: Vision Working Group Report and Scenarios

    Science.gov (United States)

    2010-07-01

    tive of a traditional interagency space working group. It is hard to put a finger on just when the land grab for the moon began. It might have...scenario, a standing Inter- agency Team has been formed to bridge differences in agency priorities. 93 It is hard to put a finger on just when the Moon...6, 1997, pp. 633-647. 243 14. Stephen Millet , “The future of scenarios: challenges and opportunities,” Strategy & Leadership, Vol. 31, No. 2, 2003

  5. The star formation histories of local group dwarf galaxies. II. Searching for signatures of reionization

    Energy Technology Data Exchange (ETDEWEB)

    Weisz, Daniel R. [Department of Astronomy, University of California at Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Dolphin, Andrew E. [Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756 (United States); Skillman, Evan D. [Minnesota Institute for Astrophysics, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States); Holtzman, Jon [Department of Astronomy, New Mexico State University, Box 30001, 1320 Frenger Street, Las Cruces, NM 88003 (United States); Gilbert, Karoline M.; Dalcanton, Julianne J.; Williams, Benjamin F., E-mail: drw@ucsc.edu [Department of Astronomy, University of Washington, Box 351580, Seattle, WA 98195 (United States)

    2014-07-10

    We search for signatures of reionization in the star formation histories (SFHs) of 38 Local Group dwarf galaxies (10{sup 4} < M{sub *} < 10{sup 9} M{sub ☉}). The SFHs are derived from color-magnitude diagrams using archival Hubble Space Telescope/Wide Field Planetary Camera 2 imaging. Only five quenched galaxies (And V, And VI, And XIII, Leo IV, and Hercules) are consistent with forming the bulk of their stars before reionization, when full uncertainties are considered. Observations of 13 of the predicted 'true fossils' identified by Bovill and Ricotti show that only two (Hercules and Leo IV) indicate star formation quenched by reionization. However, both are within the virial radius of the Milky Way and evidence of tidal disturbance complicates this interpretation. We argue that the late-time gas capture scenario posited by Ricotti for the low mass, gas-rich, and star-forming fossil candidate Leo T is observationally indistinguishable from simple gas retention. Given the ambiguity between environmental effects and reionization, the best reionization fossil candidates are quenched low mass field galaxies (e.g., KKR 25).

  6. PROBLEM ASPECTS OF FORMATION OF THE LEGAL INSTITUTE OF CONSOLIDATED TAXPAYERS’ GROUPS IN RUSSIA

    Directory of Open Access Journals (Sweden)

    Irina Glazunova

    2017-01-01

    Full Text Available The subject. The article is devoted to the prerequisites of the emergence and essential characteristics of the institution of consolidated taxpayers’ groups in Russia and abroad, revealing of advantages and disadvantages of the legal regulation of the creation and operation of consolidated groups of payers of corporate profits tax, analyzing results and directions of the development of tax consolidation in Russian Federation.The purpose of the article is to identify positive and negative aspects of the functioning of the institution of consolidated taxpayers’ groups in Russia with the establishment of prospects of tax consolidation and the likely directions of its development.The description of the problem field. The development of the world economic system stimulates the emergence of new forms of management, characterized by the enlargement of busi-ness, the pooling of resources of individual enterprises into a single system in order to optimize entrepreneurial activity. These trends are reflected in the development of tax systems of various countries, that is expressed in the formation of institutions of consolidated taxpayers’ groups. Tax consolidation in Russia is a relatively new phenomenon, and it seems necessary to examine this institution from the law enforcement point of view, to evaluate its effectiveness.Methods and methodology. The authors used methods of analysis, synthesis, as well as formal-legal, comparative-legal, historical methods of investigation.Results and the scope of its application. The authors note that the institution of tax consolidation today is presented in the tax systems of most modern countries.The practice of applying the institution of consolidated taxpayers’ groups testifies to the existence of a significant number of advantages and disadvantages of tax consolidation in Russia. The moratorium on the creation of consolidated taxpayers’ groups, due to the contradictory nature of their influence on the

  7. Aperiodic dynamics in a deterministic adaptive network model of attitude formation in social groups

    Science.gov (United States)

    Ward, Jonathan A.; Grindrod, Peter

    2014-07-01

    Adaptive network models, in which node states and network topology coevolve, arise naturally in models of social dynamics that incorporate homophily and social influence. Homophily relates the similarity between pairs of nodes' states to their network coupling strength, whilst social influence causes coupled nodes' states to convergence. In this paper we propose a deterministic adaptive network model of attitude formation in social groups that includes these effects, and in which the attitudinal dynamics are represented by an activato-inhibitor process. We illustrate that consensus, corresponding to all nodes adopting the same attitudinal state and being fully connected, may destabilise via Turing instability, giving rise to aperiodic dynamics with sensitive dependence on initial conditions. These aperiodic dynamics correspond to the formation and dissolution of sub-groups that adopt contrasting attitudes. We discuss our findings in the context of cultural polarisation phenomena. Social influence. This reflects the fact that people tend to modify their behaviour and attitudes in response to the opinions of others [22-26]. We model social influence via diffusion: agents adjust their state according to a weighted sum (dictated by the evolving network) of the differences between their state and the states of their neighbours. Homophily. This relates the similarity of individuals' states to their frequency and strength of interaction [27]. Thus in our model, homophily drives the evolution of the weighted ‘social' network. A precise formulation of our model is given in Section 2. Social influence and homophily underpin models of social dynamics [21], which cover a wide range of sociological phenomena, including the diffusion of innovations [28-32], complex contagions [33-36], collective action [37-39], opinion dynamics [19,20,40,10,11,13,15,41,16], the emergence of social norms [42-44], group stability [45], social differentiation [46] and, of particular relevance

  8. Chemical Evolution and Star Formation History of the Disks of Spirals in Local Group

    Science.gov (United States)

    Yin, J.

    2011-05-01

    Milky Way (MW), M31 and M33 are the only three spiral galaxies in our Local group. MW and M31 have similar mass, luminosity and morphology, while M33 is only about one tenth of MW in terms of its baryonic mass. Detailed theoretical researches on these three spirals will help us to understand the formation and evolution history of both spiral galaxies and Local group. Referring to the phenomenological chemical evolution model adopted in MW disk, a similar model is established to investigate the star formation and chemical enrichment history of these three local spirals. Firstly, the properties of M31 disk are studied by building a similar chemical evolution model which is able to successfully describe the MW disk. It is expected that a simple unified phenomenological chemical evolution model could successfully describe the radial and global properties of both disks. Comparing with the former work, we adopt an extensive data set as model constraints, including the star formation profile of M31 disk derived from the recent UV data of GALEX. The comparison among the observed properties of these two disks displays very interesting similarities in their radial profiles when the distance from the galactic center is expressed in terms of the corresponding scale length. This implies some common processes in their formation and evolution history. Based on the observed data of the gas mass surface density and SFR surface density, the SFR radial profile of MW can be well described by Kennicutt-Schmidt star formation law (K-S law) or modified K-S law (SFR is inversely proportional to the distance from the galactic center), but this is not applicable to the M31 disk. Detailed calculations show that our unified model describes fairly well all the main properties of the MW disk and most properties of M31 disk, provided that the star formation efficiency of M31 disk is adjusted to be twice as large as that of MW disk (as anticipated from the lower gas fraction of M31). However, the

  9. Experimental and Kinetic Investigation of the Influence of OH Groups on NOX Formation

    KAUST Repository

    Bohon, Myles

    2016-01-01

    the differences in NO formation. Measurements of temperature profiles and in-flame species concentrations, utilizing both probed and non-intrusive laser based techniques, allowed for the investigation of NO formation through non-thermal pathways

  10. Correlations and Areal Distribution of the Table Mountain Formation, Stanislaus Group; Central Sierra Nevada, California

    Science.gov (United States)

    Torrez, G.; Carlson, C. W.; Putirka, K. D.; Pluhar, C. J.; Sharma, R. K.

    2011-12-01

    Late Cenozoic evolution of the western Cordillera is a matter of ongoing debate in geologic studies. Volcanic deposits within, and adjacent to the Sierra Nevada have played a significant role in many of these debates. With local faulting coincident with eruption of members of the Stanislaus Group at ca. 38°N, the composition and correlation of these volcanics can greatly aid our understanding of Sierra Nevada tectonics. At the crest of the central Sierra Nevada, 23 trachyandesite lava flows of the Table Mountain Formation, dated at ~10 Ma, cap Sonora Peak. These 23 flows compose the thickest and most complete known stratigraphic section of the Table Mountain Formation in the region. Located ~12 km east of Sonora Peak are 16 flows of trachyandesite at Grouse Meadow. We have collected a detailed set of geochemical and paleomagnetic data for flows of these two sections at Sonora Peak and Grouse Meadows in an attempt to correlate volcanic, paleomagnetic and structural events related to uplift and extension in the Sierra Nevada and the Walker Lane. Correlation of individual flows is possible based on: stratigraphic order, temporal gaps in deposition as determined by paleomagnetic remanence direction and nonconformities, and flow geochemistry. These correlations allow us to infer source localities, flow directions, and temporal changes in flow routes. The large number of flows present at Grouse Meadow provides an additional data set from which to correlate various localities in the region to those units not represented at Sonora Peak. Several flows which occur in the upper portions of the Sonora Peak and Grouse Meadow stratigraphic sections do not correlate between these localities. The causes of stratigraphic discontinuity potentially represent: tectonic isolation across the Sierran Crest, topographic isolation by the emplacement of younger flows, or the combination of the two. Additional to the correlation of individual flows at these localities, this study shows a

  11. The Star Formation History of the Local Group Dwarf Galaxy Leo I

    Science.gov (United States)

    Gallart, Carme; Freedman, Wendy L.; Aparicio, Antonio; Bertelli, Giampaolo; Chiosi, Cesare

    1999-11-01

    We present a quantitative analysis of the star formation history (SFH) of the Local Group dSph galaxy Leo I, from the information in its Hubble Space Telescope [(V-I),I] color-magnitude diagram (CMD). It reaches the level of the oldest main-sequence turnoffs, and this allows us to retrieve the SFH in considerable detail. The method we use is based on comparing, via synthetic CMDs, the expected distribution of stars in the CMD for different evolutionary scenarios with the observed distribution. We consider the SFH to be composed by the SFR(t), the chemical enrichment law Z(t), the initial mass function (IMF), and a function β(f,q) controlling the fraction f and mass ratio distribution q of binary stars. We analyze a set of ~=50 combinations of four Z(t), three IMFs, and more than four β(f,q). For each of them, the best SFR(t) is searched for among ~=6x107 models. The comparison between the observed CMD and the model CMDs is done through χ2ν minimization of the differences in the number of stars in a set of regions of the CMD, chosen to sample stars of different ages or in specific stellar evolutionary phases. We empirically determine the range of χ2ν values that indicate acceptable models for our set of data using tests with models with known SFHs. Our solution for the SFH of Leo I defines a minimum of χ2ν in a well-defined position of the parameter space, and the derived SFR(t) is robust, in the sense that its main characteristics are unchanged for different combinations of the remaining parameters. However, only a narrow range of assumptions for Z(t), IMF, and β(f,q) result in a good agreement between the data and the models, namely, Z=0.0004, a IMF Kroupa et al. or slightly steeper, and a relatively large fraction of binary stars, with f=0.3-0.6, q>0.6, and an approximately flat IMF for the secondaries, or particular combinations of these parameters that would produce a like fraction of similar mass binaries. Most star formation activity (70% to 80

  12. SOCIAL COMPETENCE FORMATION AMONG TEENAGERS FROM HUMANIST TREND MULTIPLE-AGED GROUPS

    Directory of Open Access Journals (Sweden)

    Larisa A. Krapivina

    2015-01-01

    Full Text Available The paper studies the problems of social development of adolescents in multiple-aged groups (MAG.Methods. The methods involve socio-personal approach, consideration of the subject in a certain ideological humanistic orientation, comparative analysis, and comparison of historical facts, the study of social phenomena of different ages, long-term scientific observations, reflections, a retrospective analysis of personal experience.Results. The author describes objective conditions for the uprise of extremist, subcultural youth of multiple-aged groups, and the reasons whence they begin to perform distinctive functions that are specific for teenagers. Options for models of MAG humanistic educational systems formed in Russian and foreign social and pedagogical practice are listed. A complex of pedagogical conditions provided for the formation of social competence of adolescents in multiple-aged associations of humanistic orientation is considered. It has been found that this type of system is characterized by the following features: the principle of voluntary association of people, independence of subjects, rapid adaptation to changing socio-cultural situation, a variety of activities by interests, alternating change of activities, conflict resolution within the team, a high level of team spirit, selfmanagement, the creative nature of educational process, upbringing, socialization and self-realization. A brief description of conditions for development of fundamental human values among adolescents and formation of new specific complicated humanistic human and personal relations in global world is given.Scientific novelty. The author studies the following concepts: educational system of multiple-aged associations, teenager social competence, ambivalent behavior, emotional and moral compass of personality, invisible assets of the team, emergent effect of multiple-aged groups, inter-age communication. It was found that the specificity of MAG educational

  13. ULTRAVIOLET+INFRARED STAR FORMATION RATES: HICKSON COMPACT GROUPS WITH SWIFT AND SPITZER

    International Nuclear Information System (INIS)

    Tzanavaris, P.; Hornschemeier, A. E.; Immler, S.; Gallagher, S. C.; Johnson, K. E.; Reines, A. E.; Gronwall, C.; Hoversten, E.; Charlton, J. C.

    2010-01-01

    We present Swift UVOT ultraviolet (UV; 1600-3000 A) data with complete three-band UV photometry for a sample of 41 galaxies in 11 nearby ( -1 ) Hickson Compact Groups (HCGs) of galaxies. We use UVOT uvw2-band (2000 A) photometry to estimate the dust-unobscured component, SFR UV , of the total star formation rate, SFR TOTAL . We use Spitzer MIPS 24 μm photometry to estimate SFR IR , the component of SFR TOTAL that suffers dust extinction in the UV and is re-emitted in the IR. By combining the two components, we obtain SFR TOTAL estimates for all HCG galaxies. We obtain total stellar mass, M * , estimates by means of Two Micron All Sky Survey K s -band luminosities, and use them to calculate specific star formation rates, SSFR ≡ SFR TOTAL /M * . SSFR values show a clear and significant bimodality, with a gap between low (∼ -11 yr -1 ) and high-SSFR (∼>1.2 x 10 -10 yr -1 ) systems. We compare this bimodality to the previously discovered bimodality in α IRAC , the MIR activity index from a power-law fit to the Spitzer IRAC 4.5-8 μm data for these galaxies. We find that all galaxies with α IRAC ≤ 0 ( >0) are in the high- (low-) SSFR locus, as expected if high levels of star-forming activity power MIR emission from polycyclic aromatic hydrocarbon molecules and a hot dust continuum. Consistent with this finding, all elliptical/S0 galaxies are in the low-SSFR locus, while 22 out of 24 spirals/irregulars are in the high-SSFR locus, with two borderline cases. We further divide our sample into three subsamples (I, II, and III) according to decreasing H I richness of the parent galaxy group to which a galaxy belongs. Consistent with the SSFR and α IRAC bimodality, 12 out of 15 type I (11 out of 12 type III) galaxies are in the high- (low-) SSFR locus, while type II galaxies span almost the full range of SSFR values. We use the Spitzer Infrared Nearby Galaxy Survey (SINGS) to construct a comparison subsample of galaxies that (1) match HCG galaxies in J-band total

  14. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  15. The Theoretical Foundations of Formation of the Essence of Concept of «Ensuring the Economic Security of Enterprise in the Conditions of Raiding»

    Directory of Open Access Journals (Sweden)

    Pysarevskyi Mykola I.

    2017-05-01

    Full Text Available The article is aimed at the scientific substantiation of the theoretical aspects of formation of an effective mechanism for ensuring the economic security of enterprise in the conditions of raiding. The conceptual approaches to determining the main features of individual elements of the conceptual apparatus, namely, the concepts of «economic security of enterprise» and «raiding» were analyzed. The author’s own definition of ensuring the economic security of enterprise in the conditions of raiding has been formed, which provides an opportunity to develop a complex of organizational and economic measures aimed at maintaining the sustainable functioning and development of enterprise in the current and future periods. Prospect for further research in this direction is a critical analysis of the approaches to assessing threats to the economic security of enterprise in the context of raiding, thus broadening the theoretical basis for an effective response mechanism and establishing a qualitative methodical basis for research. Application of new scientific and methodical approaches to the integrated assessment of the level of economic security in the conditions of raiding will ensure the development and implementation of efficient managerial decisions aimed at establishing a system of preventive measures to address threats to the economic security of enterprise.

  16. Gibbs Free Energy of Formation for Selected Platinum Group Minerals (PGM

    Directory of Open Access Journals (Sweden)

    Spiros Olivotos

    2016-01-01

    Full Text Available Thermodynamic data for platinum group (Os, Ir, Ru, Rh, Pd and Pt minerals are very limited. The present study is focused on the calculation of the Gibbs free energy of formation (ΔfG° for selected PGM occurring in layered intrusions and ophiolite complexes worldwide, applying available experimental data on their constituent elements at their standard state (ΔG = G(species − ΔG(elements, using the computer program HSC Chemistry software 6.0. The evaluation of the accuracy of the calculation method was made by the calculation of (ΔGf of rhodium sulfide phases. The calculated values were found to be ingood agreement with those measured in the binary system (Rh + S as a function of temperature by previous authors (Jacob and Gupta (2014. The calculated Gibbs free energy (ΔfG° followed the order RuS2 < (Ir,OsS2 < (Pt, PdS < (Pd, PtTe2, increasing from compatible to incompatible noble metals and from sulfides to tellurides.

  17. Examining the Center: Positions, Dominance, and Star Formation Rates of Most Massive Group Galaxies at Intermediate Redshift

    Science.gov (United States)

    Connelly, Jennifer L.; Parker, Laura C.; McGee, Sean; Mulchaey, John S.; Finoguenov, Alexis; Balogh, Michael; Wilman, David; Group Environment Evolution Collaboration

    2015-01-01

    The group environment is believed to be the stage for many galaxy transformations, helping evolve blue star-forming galaxies to red passive ones. In local studies of galaxy clusters, the central member is usually a single dominant giant galaxy at the center of the potential with little star formation thought to be the result of galaxy mergers. In nearby groups, a range of morphologies and star formation rates are observed and the formation history is less clear. Further, the position and dominance of the central galaxy cannot be assumed in groups, which are less massive and evolved than clusters. To understand the connections between global group properties and properties of the central group galaxy at intermediate redshift, we examine galaxy groups from the Group Environment and Evolution Collaboration (GEEC) catalog, including both optically- and X-ray-selected groups at redshift z~0.4. The sample is diverse, containing a range in overall mass and evolutionary state. The number of groups is significant, membership is notably complete, and measurements span the IR to the UV allowing the properties of the members to be connected to those of the host groups. Having investigated trends in the global group properties previously, including mass and velocity substructure, we turn our attention now to the galaxy populations, focusing on the central regions of these systems. The most massive and second most massive group galaxies are identified by their stellar mass. The positions of the most massive galaxies (MMGs) are determined with respect to both the luminosity-weighted and X-ray center. Star formation rates are used to explore the fraction of passive/quiescent versus star-forming MMGs and the dominance of the MMGs in our group sample is also tested. Determinations of these characteristics and trends constitute the important first steps toward a detailed understanding of the relationships between the properties of host groups and their most massive galaxies and the

  18. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Science.gov (United States)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  19. Effectiveness of emotional skills training for patients with anorexia nervosa with autistic symptoms in group and individual format.

    Science.gov (United States)

    Adamson, James; Leppanen, Jenni; Murin, Marianna; Tchanturia, Kate

    2018-04-02

    The aim of this study was to examine the effectiveness of CREST interventions in individual and group formats for adult anorexia nervosa. Furthermore, this study also aims to analyse whether patients with high levels of autistic symptoms respond differently. Participants' self-report measures were taken before and after individual and group interventions (N = 66 and N = 62, respectively). Mixed effects analysis was used to analyse overall response to both formats and assess interaction with autism symptoms. Significant improvements were observed for patients' alexithymia in individual format, and motivation increased for participants in both interventions. Significant interactions were observed between alexithymia, social anhedonia, and autism symptoms in individual format and alexithymia in group format. No interactions between autism and time were observed for either format. CREST in both formats offers participants improvements in social-emotional and motivational domains. Patients with high levels of autism symptoms also score high on both social anhedonia and alexithymia measures, but this does not affect their response to treatment. Copyright © 2018 John Wiley & Sons, Ltd and Eating Disorders Association.

  20. Proton NMR study of the influence of heme vinyl groups on the formation of the isomeric forms of sulfmyoglobin

    International Nuclear Information System (INIS)

    Chatfield, M.J.; La Mar, G.N.; Balch, A.L.; Smith, K.M.; Parish, D.W.; LePage, T.J.

    1986-01-01

    The formation of sulfmyoglobin has been investigated for myoglobin reconstituted with hemins having vinyls replaced by hydrogens to determine the participation of the vinyl groups in the reaction processes. Green complexes are produced in all cases, proving that vinyls are not obligatory for the formation of sulfproteins. In the presence of the 4-vinyl group, the 1 H NMR spectra of the met-cyano derivatives indicate the formation of three green species; however, the most stable of these products is not formed in the absence of this group, confirming reaction of the 4-vinyl in this species. Two new red extractable sulfmyoglobin derivatives are formed in the absence of the 4-vinyl group. (Auth.)

  1. The group A streptococcal collagen-like protein 1, Scl1, mediates biofilm formation by targeting the EDA-containing variant of cellular fibronectin expressed in wounded tissue

    Science.gov (United States)

    Oliver-Kozup, Heaven; Martin, Karen H.; Schwegler-Berry, Diane; Green, Brett J.; Betts, Courtney; Shinde, Arti V.; Van De Water, Livingston; Lukomski, Slawomir

    2012-01-01

    Summary Wounds are known to serve as portals of entry for group A Streptococcus (GAS). Subsequent tissue colonization is mediated by interactions between GAS surface proteins and host extracellular matrix components. We recently reported that the streptococcal collagen-like protein-1, Scl1, selectively binds the cellular form of fibronectin (cFn) and also contributes to GAS biofilm formation on abiotic surfaces. One structural feature of cFn, which is predominantly expressed in response to tissue injury, is the presence of a spliced variant containing extra domain A (EDA/EIIIA). We now report that GAS biofilm formation is mediated by the Scl1 interaction with EDA-containing cFn. Recombinant Scl1 proteins that bound cFn also bound recombinant EDA within the C-C′ loop region recognized by the α9β1 integrin. The extracellular 2-D matrix derived from human dermal fibroblasts supports GAS adherence and biofilm formation. Altogether, this work identifies and characterizes a novel molecular mechanism by which GAS utilizes Scl1 to specifically target an extracellular matrix component that is predominantly expressed at the site of injury in order to secure host tissue colonization. PMID:23217101

  2. Permian plants from the Chutani Formation (Titicaca Group, Northern Altiplano of Bolivia: II. The morphogenus Glossopteris

    Directory of Open Access Journals (Sweden)

    Roberto Iannuzzi

    2004-03-01

    Full Text Available Fossil plants belonging to the morphogenera Glossopteris, Pecopteris and Asterotheca were collected from the upper part of the Chutani Formation (Titicaca Group, near the town of San Pablo de Tiquina, on the southeastern shore of Lake Titicaca (northern Altiplano, Bolivia. This paper presents the first description of specimens of the morphogenus Glossopteris from Bolivia. The Bolivian specimens of Glossopteris consist of poorly-preserved impressions, although they present the diagnostic features of this morphogenus. They are fragments of leaves with secondary veins of taeniopterid-type, typical of glossopterids from Late Permian deposits of Gondwana. The only species of Pecopteris confirmed in the first part of this study, i.e. P. dolianitii Rösler and Rohn (see Vieira et al. 2004, was previously reported from the Late Permian beds of the Rio do Rasto and Estrada Nova formations in the Paraná Basin (southern Brazil. Therefore, a Late Permian age is proposed for the fossil plant-bearing beds of the Chutani Formation based on the analyzed assemblage. The phytogeographic implications of this new find are briefly analyzed.Plantas fósseis, pertencentes aos morfo-gêneros Glossopteris, Pecopteris e Asterotheca, foram coletadas na porção superior da seção aflorante da Formação Chutani, próxima ao povoado de San Pablo de Tiquina, sudeste do lago Titicaca (Altiplano norte, Bolívia. Este trabalho apresenta a primeira descrição de espécimes do morfo-gênero Glossopteris provenientes da Bolívia. Os espécimes estudados de Glossopteris consistem em impressões foliares pobremente preservadas nas quais feições diagnósticas estão presentes. Os fragmentos foliares apresentam venação secundária do tipo teniopteróide, uma característica típica de glossopterídeas encontradas em depósitos do Permiano Superior do Gondwana. Por sua vez, a única espécie de Pecopteris confirmada para estes níveis da Formação Chutani, i.e. P. dolianitii

  3. Prediction of Gibbs energies of formation and stability constants of some secondary uranium minerals containing the uranyl group

    International Nuclear Information System (INIS)

    Genderen, A.C.G. van; Weijden, C.H. van der

    1984-01-01

    For a group of minerals containing a common anion there exists a linear relationship between two parameters called ΔO and ΔF.ΔO is defined as the difference between the Gibbs energy of formation of a solid oxide and the Gibbs energy of formation of its aqueous cation, while ΔF is defined as the Gibbs energy of reaction of the formation of a mineral from the constituting oxide(s) and the acid. Using the Gibbs energies of formation of a number of known minerals the corresponding ΔO's and ΔF's were calculated and with the resulting regression equation it is possible to predict values for the Gibbs energies of formation of other minerals containing the same anion. This was done for 29 minerals containing the uranyl-ion together with phosphate, vanadate, arsenate or carbonate. (orig.)

  4. The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers - Task 2

    OpenAIRE

    REJMAN-GREENE Marek; BRZOZOWSKI Krzysztof; MANSFIELD Tony; SANCHEZ-REILLO Raul; WAGGETT Peter; WHITAKER Geoff

    2015-01-01

    Biometric technologies have advanced considerably over the past decade, and have paved the way for more widespread use by governments, commercial enterprises and, more recently, by the consumer through the introduction of sensors and apps on mobile phones. This report provides introductory information about the application of these technologies to achieve secure recognition of individuals by organisations which form part of critical infrastructures in the EU. As a specific example, it offers ...

  5. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  6. Stimulation of Changes, Collective Commitment and The Patterns of Group Formation in Community Development in South Sulawesi

    Science.gov (United States)

    Saleh, Syafiuddin

    2018-05-01

    This study aims to examine the pattern of group formation, related to the stimulation of change through the empowerment of farmers and poor fishermen The pattern of group formation is the basis for sustainable development. The research method used is qualitative descriptive method and relevant research type such as case study and triangulasi. The results of the study showed that (1) stimulation of changes made through development programs or community empowerment in the areas studied both among farm households and poor fishermen households for some programs received positive response from farmers and fishermen. However, the collective commitment to the breeding is relatively weak, since the group formed in each program is not done through good planning and concepts. (2) there are two patterns of group formation that are natural and formed formations initiated by outsiders. Groups that are naturally formed are more institutionalized and have characteristics such as intense and relatively routine interaction, strong mutual trust, and have a common form or mechanism shared for common purposes. The group can form the basis for sustainable development in improving the welfare of the poor.

  7. The Formation of Group Affect and Team Effectiveness : The Moderating Role of Identification

    NARCIS (Netherlands)

    Tanghe, Jacqueline; Wisse, Barbara; van der Flier, Henk

    In the current research we use the social identity perspective to enhance our understanding of group affect (i.e. a collectively shared pattern of affective states among group members). Because higher identification (i.e. the extent to which group members define themselves in terms of their group

  8. Theoretical predictions of hydrolysis and complex formation of group-4 elements Zr, Hf and Rf in HF and HCl solutions

    International Nuclear Information System (INIS)

    Pershina, V.; Trubert, D.; Le Naour, C.; Kratz, J.V.

    2002-01-01

    Fully relativistic molecular density-functional calculations of the electronic structures of hydrated, hydrolyzed and fluoride/chloride complexes have been performed for group-4 elements Zr, Hf, and element 104, Rf. Using the electronic density distribution data, relative values of the free energy change for hydrolysis and complex formation reactions were defined. The results show the following trend for the first hydrolysis step of the cationic species: Zr>Hf>Rf in agreement with experiments. For the complex formation in HF solutions, the trend to a decrease from Zr to Hf is continued with Rf, provided no hydrolysis takes place. At pH>0, further fluorination of hydrolyzed species or fluoro-complexes has an inversed trend in the group Rf≥Zr>Hf, with the difference between the elements being very small. For the complex formation in HCl solutions, the trend is continued with Rf, so that Zr>Hf>Rf independently of pH. A decisive energetic factor in hydrolysis or complex formation processes proved to be a predominant electrostatic metal-ligand interaction. Trends in the K d (distribution coefficient) values for the group-4 elements are expected to follow those of the complex formation

  9. Automatic Feature Selection and Weighting for the Formation of Homogeneous Groups for Regional Intensity-Duration-Frequency (IDF) Curve Estimation

    Science.gov (United States)

    Yang, Z.; Burn, D. H.

    2017-12-01

    Extreme rainfall events can have devastating impacts on society. To quantify the associated risk, the IDF curve has been used to provide the essential rainfall-related information for urban planning. However, the recent changes in the rainfall climatology caused by climate change and urbanization have made the estimates provided by the traditional regional IDF approach increasingly inaccurate. This inaccuracy is mainly caused by two problems: 1) The ineffective choice of similarity indicators for the formation of a homogeneous group at different regions; and 2) An inadequate number of stations in the pooling group that does not adequately reflect the optimal balance between group size and group homogeneity or achieve the lowest uncertainty in the rainfall quantiles estimates. For the first issue, to consider the temporal difference among different meteorological and topographic indicators, a three-layer design is proposed based on three stages in the extreme rainfall formation: cloud formation, rainfall generation and change of rainfall intensity above urban surface. During the process, the impacts from climate change and urbanization are considered through the inclusion of potential relevant features at each layer. Then to consider spatial difference of similarity indicators for the homogeneous group formation at various regions, an automatic feature selection and weighting algorithm, specifically the hybrid searching algorithm of Tabu search, Lagrange Multiplier and Fuzzy C-means Clustering, is used to select the optimal combination of features for the potential optimal homogenous groups formation at a specific region. For the second issue, to compare the uncertainty of rainfall quantile estimates among potential groups, the two sample Kolmogorov-Smirnov test-based sample ranking process is used. During the process, linear programming is used to rank these groups based on the confidence intervals of the quantile estimates. The proposed methodology fills the gap

  10. Social factors shaping the formation of a multi-stakeholder trails network group for the Monongahela National Forest, West Virginia

    Science.gov (United States)

    Karen Robinson; Steven Selin; Chad Pierskalla

    2009-01-01

    This paper reports the results and management implications of a longitudinal research study examining the social factors affecting the formation of a trails network advisory group for the Monongahela National Forest (MNF) in West Virginia. A collaborative process of creating an MNF trails network with input from local users and stakeholders has been largely...

  11. The Emergence of Embedded Relations and Group Formation in Networks of Competition

    Science.gov (United States)

    Thye, Shane R.; Lawler, Edward J.; Yoon, Jeongkoo

    2011-01-01

    This study examines how and when small networks of self-interested agents generate a group tie or affiliation at the network level. A group affiliation is formed when actors (a) perceive themselves as members of a group and (b) share resources with each other despite an underlying competitive structure. We apply a concept of structural cohesion to…

  12. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  13. Star-Formation Histories, Abundances, and Kinematics of Dwarf Galaxies in the Local Group

    NARCIS (Netherlands)

    Tolstoy, Eline; Hill, Vanessa; Tosi, Monica; Blandford, R; Kormendy, J; VanDishoeck, E

    2009-01-01

    Within the Local Universe galaxies can be studied in great detail star by star, and here we review the results of quantitative studies in nearby dwarf galaxies. The color-magnitude diagram synthesis method is well established as the most accurate way to determine star-formation histories of galaxies

  14. Stratigraphy and correlation of the Manitou Falls formation, the Athabasca Group

    International Nuclear Information System (INIS)

    Iida, Yoshimasa; Ikeda, Koki; Tsuruta, Tadahiko; Yamada, Yasuo; Ito, Hiroaki; Goto, Junichi

    1996-01-01

    Manitou Falls formation is the thick strata of Proterozoic era that spread widely in the uranium deposit zone in Northern Saskatchewan, Canada (Athabasca basin). In order to study in detail underground geological structure by trial boring, it is necessary to distinguish and compare strata by dividing them into the units as small as possible. The Manitou Falls formation is composed of only sandstone and conglomerate, and it does not have simply identified, continuous strata like tuff and coal layers. In the Christie Lake B district located in Eastern Athabasca basin, the division of strata was carried out by utilizing the data of the changes in the volume ratio of conglomerate layer and maximum pebble size and natural radioactivity logging and based on the careful comparison among trial bores. As the result, this formation was divided into the units of 9 strata. As one of the methods of identifying each unit, the comparison of the power spectra of natural radioactivity logging data was attempted. By this means, it was found that the features in the periodicity of stratum accumulation are useful for identifying strata. The outline of the Manitou Falls formation, the location of the investigated district, the basic data for stratigraphy division, the stratigraphy division in Christie Lake B district and the results are reported. (K.I.)

  15. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  16. An Agent-Based Simulation for Investigating the Impact of Stereotypes on Task-Oriented Group Formation

    Science.gov (United States)

    Maghami, Mahsa; Sukthankar, Gita

    In this paper, we introduce an agent-based simulation for investigating the impact of social factors on the formation and evolution of task-oriented groups. Task-oriented groups are created explicitly to perform a task, and all members derive benefits from task completion. However, even in cases when all group members act in a way that is locally optimal for task completion, social forces that have mild effects on choice of associates can have a measurable impact on task completion performance. In this paper, we show how our simulation can be used to model the impact of stereotypes on group formation. In our simulation, stereotypes are based on observable features, learned from prior experience, and only affect an agent's link formation preferences. Even without assuming stereotypes affect the agents' willingness or ability to complete tasks, the long-term modifications that stereotypes have on the agents' social network impair the agents' ability to form groups with sufficient diversity of skills, as compared to agents who form links randomly. An interesting finding is that this effect holds even in cases where stereotype preference and skill existence are completely uncorrelated.

  17. Lithostratigraphy of the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) at Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Moyer, T.C.; Geslin, J.K.

    1995-01-01

    Lithostratigraphic relations within the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) were reconstructed from analysis of core samples and observation of outcrop exposures. The Calico Hills Formation is composed of five nonwelded pyroclastic units (each formed of one or more pyroclastic-flow deposits) that overlie an interval of bedded tuff and a basal volcaniclastic sandstone unit. The Prow Pass Tuff is divided into four pyroclastic units and an underlying interval of bedded tuff. The pyroclastic units of the Prow Pass Tuff are distinguished by the sizes and amounts of their pumice and lithic clasts and their degree of welding. Pyroclastic units of the Prow Pass Tuff are distinguished from those of the Calico Hills Formation by their phenocryst assemblage, chemical composition, and ubiquitous siltstone lithic clasts. Downhole resistivity tends to mirror the content of authigenic minerals, primarily zeolites, in both for-mations and may be useful for recognizing the vitric-zeolite boundary in the study area. Maps of zeolite distribution illustrate that the bedded tuff and basal sandstone units of the Calico Hills Formation are altered over a wider area than the pyroclastic units of both the Calico Hills Formation and the upper Prow Pass Tuff

  18. Lithostratigraphy of the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) at Yucca Mountain, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Moyer, T.C.; Geslin, J.K. [Science Applications International Corp., Las Vegas, NV (United States)

    1995-07-01

    Lithostratigraphic relations within the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) were reconstructed from analysis of core samples and observation of outcrop exposures. The Calico Hills Formation is composed of five nonwelded pyroclastic units (each formed of one or more pyroclastic-flow deposits) that overlie an interval of bedded tuff and a basal volcaniclastic sandstone unit. The Prow Pass Tuff is divided into four pyroclastic units and an underlying interval of bedded tuff. The pyroclastic units of the Prow Pass Tuff are distinguished by the sizes and amounts of their pumice and lithic clasts and their degree of welding. Pyroclastic units of the Prow Pass Tuff are distinguished from those of the Calico Hills Formation by their phenocryst assemblage, chemical composition, and ubiquitous siltstone lithic clasts. Downhole resistivity tends to mirror the content of authigenic minerals, primarily zeolites, in both for-mations and may be useful for recognizing the vitric-zeolite boundary in the study area. Maps of zeolite distribution illustrate that the bedded tuff and basal sandstone units of the Calico Hills Formation are altered over a wider area than the pyroclastic units of both the Calico Hills Formation and the upper Prow Pass Tuff.

  19. Presence of the dinosaur Scelidosaurus indicates Jurassic age for the Kayenta Formation (Glen Canyon Group, northern Arizona)

    Science.gov (United States)

    Padian, Kevin

    1989-05-01

    The Glen Canyon Group (Moenave, Wingate, Kayenta and Navajo Formations) of northern Arizona represents an extensive outcrop of early Mesozoic age terrestrial sediments. The age of these formations has long been disputed because independent stratigraphic data from marine tie-ins, paleobotanical and palynological evidence, and radiometric calibrations have been scanty or absent. The fauna of the Kayenta Formation in particular has been problematic because it has appeared to contain both typical Late Triassic and Early Jurassic taxa Here I report that the principal evidence for Late Triassic taxa, dermal scutes previously assigned to an aetosaur, in fact belongs to the thyreophoran ornithischian dinosaur Scelidosaurus, previously known only as a washed-in form found in marine sediments in the Early Jurassic of England. The presence of this dinosaur represents the first vertebrate biostratigraphic tie-in of the Glen Canyon Group horizons with reliably dated marine deposits in Europe. Together with revised systematic assessments of other vertebrates and independent evidence from fossil pollen, it supports an Early Jurassic age for the Kayenta Formation and most or all of the Glen Canyon Group.

  20. Comparative analysis of the calcretization process in the Marilia formations (Bauru group - Brasil) and Mercedes ( Paysandu group - Uruguay), Upper Cretaceous of the Parana basin

    International Nuclear Information System (INIS)

    Veroslavsky, G.; Etchebehere, M.; Sad, A.; Fulfaro, J.

    1998-01-01

    Pedogenic and non-pedogenic calcrete facies are very common feature of Marilia (Brazil) and Mercedes (Uruguay) formations in the Parana Basin. The non-pedogenic ones constitute massive limestone facies that have been recently interpreted as groundwater calcretes. These limestones are exploited in both countries to supply raw materials to Portland cement and soil conditioner in origin and age of calcretization phenomena. In Uruguay, the calcretization process seens to be band formation. Field relationships and fossil assemblage point to a Paleocene (or later) age for the calcretization. In Brazilian territory, the groundwater calcretes aresupposed to be of Upper Cretaceous age due to the presence of dinosaurs scattered through the Bauru Group, including siliciclastic beds below and above the calcretes. The authors assume that calcretization processes are similar in both countries (host rocks, intensity, size, textures, geometries and economic potential). The main difference is in age of the calcretization. (author)

  1. The Methodical Approach to Formation of the Economic-Social Provision of the Financial Security Management of Commercial Bank

    Directory of Open Access Journals (Sweden)

    Baryliuk Mariia-Mariana R.

    2017-06-01

    Full Text Available The article defines that the impact of threats on a commercial bank as an open socio-economic system results in losses that can be classified as financial, personnel, informational, and reputational. In terms of temporal horizons, losses are defined as tactical and strategic. Possible losses from external and internal threat implications have been determined, which have resulted in the development of a four-level structure of total losses from threat implications for the financial security of commercial bank. The proposed sequence of calculations for integrated assessment of threats impact provides an information basis for the development and introducing a set of interrelated organizational-economic measures to implement changes in the subsystem of financial security of commercial bank. The level of threats identified, the nature and extent of financial, personnel, information, and reputational losses are the basis for more efficient use of available resources and for improving the financial security management of commercial bank.

  2. Educational Outcomes of Small-Group Discussion Versus Traditional Lecture Format in Dental Students' Learning and Skills Acquisition.

    Science.gov (United States)

    Arias, Ana; Scott, Raymond; Peters, Ove A; McClain, Elizabeth; Gluskin, Alan H

    2016-04-01

    The aim of this prospective quantitative study was to compare the effect of different instructional formats on dental students' skills and knowledge acquisition for access cavity preparation. All first-year dental students were invited to participate in this study conducted during the four consecutive two-week endodontic rotation courses at the University of the Pacific Arthur A. Dugoni School of Dentistry in spring semester 2015. Four alphabetically distributed intact groups of students were randomly allocated to two groups (n=70 each) that participated in either small-group discussion or a traditional lecture on access preparation. The first outcome measure was skill acquisition, measured by the quality of access cavities prepared in extracted teeth at the conclusion of the session. Two blinded raters scored direct observations on a continuous scale. Knowledge, the second outcome measure, was scored with a multiple-choice and open-ended question test at the end of each two-week session. Data were obtained for 134 of the 140 students, for a 96% response rate. The results showed that students in the small-group discussion groups scored significantly higher than those in the lecture groups when skill performance was tested (p=8.9 × 10(-7)). However, no significant differences were found in the acquisition of knowledge between the two groups on the written test. Active student participation was significantly related to improved manual skill acquisition, but the format of the session does not seem to have had a direct influence on acquired knowledge.

  3. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  4. Depositional History and Sequence Stratigraphy of the Middle Ordovician Yeongheung Formation (Yeongweol Group), Taebaeksan Basin, mid-east Korea

    Science.gov (United States)

    Kwon, Yoo Jin; Kwon, Yi Kyun

    2017-04-01

    The Middle Ordovician Yeongheung Formation consists of numerous meter-scale, shallowing-upward cycles which were deposited on a shallow-marine carbonate platform. Many diagnostic sedimentary textures and structures such as supratidal laminite, tepee structure, and solution-collapsed breccia are observed, which enable to infer the dry climate and high salinity conditions during deposition of the formation. In order to understand its depositional history, this study focuses on vertical and spatial stacking patterns of the second- to third-order sequences through the detailed outcrop description and geologic mapping. A total 19 lithofacies have been recognized, which can be grouped into 5 facies associations (FAs): FA1 (Supratidal flat), FA2 (Supratidal or dolomitization of peritidal facies), FA3 (Intertidal flat), FA4 (Shallow subtidal to peritidal platform), FA5 (Shallow subtidal shoal). Global mega-sequence boundary (Sauk-Tippecanoe) occurs in solution-collapsed breccia zone in the lower part of the formation. Correlation of the shallowing-upward cycle stacking pattern across the study area defines 6 transgressive-regressive depositional sequences. Each depositional sequences comprises a package of vertical and spatial staking of shallow subtidal cycles in the lower part and peritidal cycles in the upper part of the formation. According to sequence stratigraphic interpretation, the reconstructed relative sea-level curve of the Yeongweol platform is very similar to that of the Taebaek platform. Based on the absence of siliciclastic sequence such as the Jigunsan Formation and the lithologic & stratigraphic differences, however, the Yeongweol and Taebaek groups might not belong to a single depositional system within the North China platform. The Yeongweol Group can be divided by the four subunits into their unique lithologic successions and geographic distributions. The Eastern subunit of the Yeongweol Group is composed dominantly of carbonate rocks with a high

  5. Item Construction Using Reflective, Formative, or Rasch Measurement Models: Implications for Group Work

    Science.gov (United States)

    Peterson, Christina Hamme; Gischlar, Karen L.; Peterson, N. Andrew

    2017-01-01

    Measures that accurately capture the phenomenon are critical to research and practice in group work. The vast majority of group-related measures were developed using the reflective measurement model rooted in classical test theory (CTT). Depending on the construct definition and the measure's purpose, the reflective model may not always be the…

  6. Undergraduate ALFALFA Team: Analysis of Spatially-Resolved Star-Formation in Nearby Galaxy Groups and Clusters

    Science.gov (United States)

    Finn, Rose; Collova, Natasha; Spicer, Sandy; Whalen, Kelly; Koopmann, Rebecca A.; Durbala, Adriana; Haynes, Martha P.; Undergraduate ALFALFA Team

    2017-01-01

    As part of the Undergraduate ALFALFA Team, we are conducting a survey of the gas and star-formation properties of galaxies in 36 groups and clusters in the local universe. The galaxies in our sample span a large range of galactic environments, from the centers of galaxy groups and clusters to the surrounding infall regions. One goal of the project is to map the spatial distribution of star-formation; the relative extent of the star-forming and stellar disks provides important information about the internal and external processes that deplete gas and thus drive galaxy evolution. We obtained wide-field H-alpha observations with the WIYN 0.9m telescope at Kitt Peak National Observatory for galaxies in the vicinity of the MKW11 and NRGb004 galaxy groups and the Abell 1367 cluster. We present a preliminary analysis of the relative size of the star-forming and stellar disks as a function of galaxy morphology and local galaxy density, and we calculate gas depletion times using star-formation rates and HI gas mass. We will combine these results with those from other UAT members to determine if and how environmentally-driven gas depletion varies with the mass and X-ray properties of the host group or cluster. This work has supported by NSF grants AST-0847430, AST-1211005 and AST-1637339.

  7. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  8. Household food security and nutritional status of vulnerable groups in Kenya : a seasonal study among low income smallholder rural households

    NARCIS (Netherlands)

    Kigutha, H.N.

    1994-01-01

    Climatic seasonality is now recognized as being a constraint to agricultural production and to household food security in many countries within the tropical regions of the world. This study investigated the extent to which a unimodal climatic pattern affects food production and food

  9. Group formation in a public good experiment: on the dynamics of social ties structures

    NARCIS (Netherlands)

    Sonnemans, J.H.; van Dijk, F.; van Winden, F.A.A.M.

    1999-01-01

    Economic behavior often takes place in groups of small numbers of peopleinteracting with each other (like work teams, neighborhoods, socialnetworks, etc.). Characteristic of such interaction is the development of(affective) interpersonal relationships, or social ties. According tosociologists, the

  10. Petrology and geochemistry of REE-rich Mafé banded iron formations (Bafia group, Cameroon)

    Science.gov (United States)

    Nkoumbou, Charles; Gentry, Fuh Calistus; Tchakounte Numbem, Jacqueline; Belle Ekwe Lobé, Yolande Vanessa; Nwagoum Keyamfé, Christin Steve

    2017-07-01

    Archaean-Paleoproterozoic foliated amphibole-gneisses and migmatites interstratified with amphibolites, pyroxeno-amphibolites and REE-rich banded-iron formations outcrop at Mafé, Ndikinimeki area. The foliation is nearly vertical due to tight folds. Flat-lying quartz-rich mica schists and quartzites, likely of Pan-African age, partly cover the formations. Among the Mafé BIFs, the oxide BIF facies shows white layers of quartz and black layers of magnetite and accessory hematite, whereas the silicate BIF facies is made up of thin discontinuous quartz layers alternating with larger garnet (almandine-spessartine) + chamosite + ilmenite ± Fe-talc layers. REE-rich oxide BIFs compositions are close to the East Pacific Rise (EPR) hydrothermal deposit; silicate BIFs plot midway between EPR and the associated amphibolite, accounting for a contamination by volcanic materials, in addition to the hydrothermal influence during their oceanic deposition. The association of an oceanic setting with alkaline and tholeiitic magmatism is typical of the Algoma-type BIF deposit. The REE-rich BIFs indices recorded at Mafé are interpreted as resulting from an Archaean-Paleoproterozoic mineralization.

  11. Use of formative research and social network theory to develop a group walking intervention: Sumter County on the Move!

    Science.gov (United States)

    Forthofer, Melinda; Burroughs-Girardi, Ericka; Stoisor-Olsson, Liliana; Wilcox, Sara; Sharpe, Patricia A; Pekuri, Linda M

    2016-10-01

    Although social support is a frequently cited enabler of physical activity, few studies have examined how to harness social support in interventions. This paper describes community-based formative research to design a walking program for mobilizing naturally occurring social networks to support increases in walking behavior. Focus group methods were used to engage community members in discussions about desired walking program features. The research was conducted with underserved communities in Sumter County, South Carolina. The majority of focus group participants were women (76%) and African American (92%). Several important themes emerged from the focus group results regarding attitudes toward walking, facilitators of and barriers to walking, ideal walking program characteristics, and strategies for encouraging community members to walk. Most noteably, the role of existing social networks as a supportive influence on physical activity was a recurring theme in our formative research and a gap in the existing evidence base. The resulting walking program focused on strategies for mobilizing, supporting and reinforcing existing social networks as mechanisms for increasing walking. Our approach to linking theory, empirical evidence and community-based formative research for the development of a walking intervention offers an example for practitioners developing intervention strategies for a wide range of behaviors. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. The International Dermatology Outcome Measures Group: formation of patient-centered outcome measures in dermatology.

    Science.gov (United States)

    Gottlieb, Alice B; Levin, Adriane A; Armstrong, April W; Abernethy, April; Duffin, Kristina Callis; Bhushan, Reva; Garg, Amit; Merola, Joseph F; Maccarone, Mara; Christensen, Robin

    2015-02-01

    As quality standards are increasingly in demand throughout medicine, dermatology needs to establish outcome measures to quantify the effectiveness of treatments and providers. The International Dermatology Outcome Measures Group was established to address this need. Beginning with psoriasis, the group aims to create a tool considerate of patients and providers using the input of all relevant stakeholders in assessment of disease severity and response to treatment. Herein, we delineate the procedures through which consensus is being reached and the future directions of the project. Copyright © 2014 American Academy of Dermatology, Inc. Published by Elsevier Inc. All rights reserved.

  13. ON THE FORMATION OF AMIDE POLYMERS VIA CARBONYL–AMINO GROUP LINKAGES IN ENERGETICALLY PROCESSED ICES OF ASTROPHYSICAL RELEVANCE

    Energy Technology Data Exchange (ETDEWEB)

    Förstel, Marko; Maksyutenko, Pavlo; Jones, Brant M.; Kaiser, Ralf I. [Department of Chemistry, University of Hawaii, 2545 McCarthy Mall, 96822 HI (United States); Sun, Bing J.; Lee, Huan C.; Chang, Agnes H. H., E-mail: ralfk@hawaii.edu, E-mail: hhchang@mail.ndhu.edu.tw [Department of Chemistry, National Dong Hwa University, Shoufeng, Hualien 974, Taiwan (China)

    2016-04-01

    We report on the formation of organic amide polymers via carbonyl–amino group linkages in carbon monoxide and ammonia bearing energetically processed ices of astrophysical relevance. The first group comprises molecules with one carboxyl group and an increasing number of amine moieties starting with formamide (45 u), urea (60 u), and hydrazine carboxamide (75 u). The second group consists of species with two carboxyl (58 u) and up to three amine groups (73 u, 88 u, and 103 u). The formation and polymerization of these linkages from simple inorganic molecules via formamide und urea toward amide polymers is discussed in an astrophysical and astrobiological context. Our results show that long chain molecules, which are closely related to polypeptides, easily form by energetically processing simple, inorganic ices at very low temperatures and can be released into the gas phase by sublimation of the ices in star-forming regions. Our experimental results were obtained by employing reflectron time-of-flight mass spectroscopy, coupled with soft, single photon vacuum ultraviolet photoionization; they are complemented by theoretical calculations.

  14. ON THE FORMATION OF AMIDE POLYMERS VIA CARBONYL–AMINO GROUP LINKAGES IN ENERGETICALLY PROCESSED ICES OF ASTROPHYSICAL RELEVANCE

    International Nuclear Information System (INIS)

    Förstel, Marko; Maksyutenko, Pavlo; Jones, Brant M.; Kaiser, Ralf I.; Sun, Bing J.; Lee, Huan C.; Chang, Agnes H. H.

    2016-01-01

    We report on the formation of organic amide polymers via carbonyl–amino group linkages in carbon monoxide and ammonia bearing energetically processed ices of astrophysical relevance. The first group comprises molecules with one carboxyl group and an increasing number of amine moieties starting with formamide (45 u), urea (60 u), and hydrazine carboxamide (75 u). The second group consists of species with two carboxyl (58 u) and up to three amine groups (73 u, 88 u, and 103 u). The formation and polymerization of these linkages from simple inorganic molecules via formamide und urea toward amide polymers is discussed in an astrophysical and astrobiological context. Our results show that long chain molecules, which are closely related to polypeptides, easily form by energetically processing simple, inorganic ices at very low temperatures and can be released into the gas phase by sublimation of the ices in star-forming regions. Our experimental results were obtained by employing reflectron time-of-flight mass spectroscopy, coupled with soft, single photon vacuum ultraviolet photoionization; they are complemented by theoretical calculations

  15. Features of the formative educational training groups in Youth sports schools in terms of our time

    Directory of Open Access Journals (Sweden)

    Artem Zhytnitskyi

    2015-12-01

    Full Text Available Purpose: identify the factors affecting the effective performance of the Children and Youth Sports School at the initial and preliminary stage of basic training. Material and Methods: analysis of the literary base, pedagogical research methods, statistical methods, questionnaire. Results: the understanding of the factors influencing the motor skills formation of students is displayed. The author grounded three-dimensional understanding of dissimilar conditions and factors determining the functionality of a Children and Youth Sports School taking into account the motivation of students the scope of use of the skills and other factors which don’t deal with teaching science. Conclusions: it was found that miscellaneous factors, many of which are associated with the state of material and technical base and infrastructure of the school, the region and the country as a whole affect screening the contingent of a Children and Youth Sports School

  16. Dietary treatment of urinary risk factors for renal stone formation. A review of CLU Working Group.

    Science.gov (United States)

    Prezioso, Domenico; Strazzullo, Pasquale; Lotti, Tullio; Bianchi, Giampaolo; Borghi, Loris; Caione, Paolo; Carini, Marco; Caudarella, Renata; Ferraro, Manuel; Gambaro, Giovanni; Gelosa, Marco; Guttilla, Andrea; Illiano, Ester; Martino, Marangella; Meschi, Tiziana; Messa, Piergiorgio; Miano, Roberto; Napodano, Giorgio; Nouvenne, Antonio; Rendina, Domenico; Rocco, Francesco; Rosa, Marco; Sanseverino, Roberto; Salerno, Annamaria; Spatafora, Sebastiano; Tasca, Andrea; Ticinesi, Andrea; Travaglini, Fabrizio; Trinchieri, Alberto; Vespasiani, Giuseppe; Zattoni, Filiberto

    2015-07-07

    Diet interventions may reduce the risk of urinary stone formation and its recurrence, but there is no conclusive consensus in the literature regarding the effectiveness of dietary interventions and recommendations about specific diets for patients with urinary calculi. The aim of this study was to review the studies reporting the effects of different dietary interventions for the modification of urinary risk factors in patients with urinary stone disease. A systematic search of the Pubmed database literature up to July 1, 2014 for studies on dietary treatment of urinary risk factors for urinary stone formation was conducted according to a methodology developed a priori. Studies were screened by titles and abstracts for eligibility. Data were extracted using a standardized form and the quality of evidence was assessed. Evidence from the selected studies were used to form evidence-based guideline statements. In the absence of sufficient evidence, additional statements were developed as expert opinions. General measures: Each patient with nephrolithiasis should undertake appropriate evaluation according to the knowledge of the calculus composition. Regardless of the underlying cause of the stone disease, a mainstay of conservative management is the forced increase in fluid intake to achieve a daily urine output of 2 liters. HYPERCALCIURIA: Dietary calcium restriction is not recommended for stone formers with nephrolithiasis. Diets with a calcium content ≥ 1 g/day (and low protein-low sodium) could be protective against the risk of stone formation in hypercalciuric stone forming adults. Moderate dietary salt restriction is useful in limiting urinary calcium excretion and thus may be helpful for primary and secondary prevention of nephrolithiasis. A low-normal protein intake decrease calciuria and could be useful in stone prevention and preservation of bone mass. Omega-3 fatty acids and bran of different origin decreases calciuria, but their impact on the urinary

  17. Dietary treatment of urinary risk factors for renal stone formation. A review of CLU Working Group

    Directory of Open Access Journals (Sweden)

    Domenico Prezioso

    2015-07-01

    Full Text Available Objective: Diet interventions may reduce the risk of urinary stone formation and its recurrence, but there is no conclusive consensus in the literature regarding the effectiveness of dietary interventions and recommendations about specific diets for patients with urinary calculi. The aim of this study was to review the studies reporting the effects of different dietary interventions for the modification of urinary risk factors in patients with urinary stone disease. Materials and Methods: A systematic search of the Pubmed database literature up to July 1, 2014 for studies on dietary treatment of urinary risk factors for urinary stone formation was conducted according to a methodology developed a priori. Studies were screened by titles and abstracts for eligibility. Data were extracted using a standardized form and the quality of evidence was assessed. Results: Evidence from the selected studies were used to form evidencebased guideline statements. In the absence of sufficient evidence, additional statements were developed as expert opinions. Conclusions: General measures: Each patient with nephrolithiasis should undertake appropriate evaluation according to the knowledge of the calculus composition. Regardless of the underlying cause of the stone disease, a mainstay of conservative management is the forced increase in fluid intake to achieve a daily urine output of 2 liters. Hypercalciuria: Dietary calcium restriction is not recommended for stone formers with nephrolithiasis. Diets with a calcium content ≥ 1 g/day (and low protein-low sodium could be protective against the risk of stone formation in hypercalciuric stone forming adults. Moderate dietary salt restriction is useful in limiting urinary calcium excretion and thus may be helpful for primary and secondary prevention of nephrolithiasis. A low-normal protein intake decrease calciuria and could be useful in stone prevention and preservation of bone mass. Omega-3 fatty acids and bran of

  18. Oxo-group-14-element bond formation in binuclear uranium(V) pacman complexes

    International Nuclear Information System (INIS)

    Jones, Guy M.; Arnold, Polly L.; Love, Jason B.

    2013-01-01

    Simple and versatile routes to the functionalization of uranyl-derived U"V-oxo groups are presented. The oxo-lithiated, binuclear uranium(V)-oxo complexes [{(py)_3LiOUO}_2(L)] and [{(py)_3LiOUO}(OUOSiMe_3)(L)] were prepared by the direct combination of the uranyl(VI) silylamide ''ate'' complex [Li(py)_2][(OUO)(N'')_3](N''=N(SiMe_3)_2) with the polypyrrolic macrocycle H_4L or the mononuclear uranyl (VI) Pacman complex [UO_2(py)(H_2L)], respectively. These oxo-metalated complexes display distinct U-O single and multiple bonding patterns and an axial/equatorial arrangement of oxo ligands. Their ready availability allows the direct functionalization of the uranyl oxo group leading to the binuclear uranium(V) oxo-stannylated complexes [{(R_3Sn)OUO}_2(L)] (R=nBu, Ph), which represent rare examples of mixed uranium/tin complexes. Also, uranium-oxo-group exchange occurred in reactions with [TiCl(OiPr)_3] to form U-O-C bonds [{(py)_3LiOUO}(OUOiPr)(L)] and [(iPrOUO)_2(L)]. Overall, these represent the first family of uranium(V) complexes that are oxo-functionalised by Group 14 elements. (Copyright copyright 2013 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  19. The connection between galaxy formation and the assembly of stellar halos in the Local Group

    NARCIS (Netherlands)

    Helmi, Amina

    I will review our current understanding of the assembly of stellar halos from a theoretical perspective. I will place particular emphasis on how observations of Local Group galaxies can be used to constrain the assembly history of both their stellar and dark matter halos. Finally I will focus on

  20. Training in Statistical Reasoning Inhibits the Formation of Erroneous Group Stereotypes.

    Science.gov (United States)

    Schaller, Mark; And Others

    1996-01-01

    Tested the hypothesis that training in statistical reasoning inhibits erroneous group stereotypes. In study one, 60 students were assigned to a control or one of two training conditions focused on training in the logic of analysis of covariance. Study two (N=82) replicated study one. Study three (N=44) tested an alternative explanation, providing…

  1. In love and war: altruism, norm formation, and two different types of group selection

    NARCIS (Netherlands)

    van Veelen, C.M.; Hopfensitz, A.

    2007-01-01

    We analyse simulations reported in "The co-evolution of individual behaviors and social institutions" by Bowles et al., 2003 in the Journal of Theoretical Biology 223, 135-147, and begin with distinguishing two types of group selection models. The literature does not provide different names for

  2. Efficacy of formative evaluation using a focus group for a large classroom setting in an accelerated pharmacy program.

    Science.gov (United States)

    Nolette, Shaun; Nguyen, Alyssa; Kogan, David; Oswald, Catherine; Whittaker, Alana; Chakraborty, Arup

    2017-07-01

    Formative evaluation is a process utilized to improve communication between students and faculty. This evaluation method allows the ability to address pertinent issues in a timely manner; however, implementation of formative evaluation can be a challenge, especially in a large classroom setting. Using mediated formative evaluation, the purpose of this study is to determine if a student based focus group is a viable option to improve efficacy of communication between an instructor and students as well as time management in a large classroom setting. Out of 140 total students, six students were selected to form a focus group - one from each of six total sections of the classroom. Each focus group representative was responsible for collecting all the questions from students of their corresponding sections and submitting them to the instructor two to three times a day. Responses from the instructor were either passed back to pertinent students by the focus group representatives or addressed directly with students by the instructor. This study was conducted using a fifteen-question survey after the focus group model was utilized for one month. A printed copy of the survey was distributed in the class by student investigators. Questions were of varying types, including Likert scale, yes/no, and open-ended response. One hundred forty surveys were administered, and 90 complete responses were collected. Surveys showed that 93.3% of students found that use of the focus group made them more likely to ask questions for understanding. The surveys also showed 95.5% of students found utilizing the focus group for questions allowed for better understanding of difficult concepts. General open-ended answer portions of the survey showed that most students found the focus group allowed them to ask questions more easily since they did not feel intimidated by asking in front of the whole class. No correlation was found between demographic characteristics and survey responses. This may

  3. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  4. The streptococcal collagen-like protein-1 (Scl1 is a significant determinant for biofilm formation by group a Streptococcus

    Directory of Open Access Journals (Sweden)

    Oliver-Kozup Heaven A

    2011-12-01

    Full Text Available Abstract Background Group A Streptococcus (GAS is a human-specific pathogen responsible for a number of diseases characterized by a wide range of clinical manifestations. During host colonization GAS-cell aggregates or microcolonies are observed in tissues. GAS biofilm, which is an in vitro equivalent of tissue microcolony, has only recently been studied and little is known about the specific surface determinants that aid biofilm formation. In this study, we demonstrate that surface-associated streptococcal collagen-like protein-1 (Scl1 plays an important role in GAS biofilm formation. Results Biofilm formation by M1-, M3-, M28-, and M41-type GAS strains, representing an intraspecies breadth, were analyzed spectrophotometrically following crystal violet staining, and characterized using confocal and field emission scanning electron microscopy. The M41-type strain formed the most robust biofilm under static conditions, followed by M28- and M1-type strains, while the M3-type strains analyzed here did not form biofilm under the same experimental conditions. Differences in architecture and cell-surface morphology were observed in biofilms formed by the M1- and M41-wild-type strains, accompanied by varying amounts of deposited extracellular matrix and differences in cell-to-cell junctions within each biofilm. Importantly, all Scl1-negative mutants examined showed significantly decreased ability to form biofilm in vitro. Furthermore, the Scl1 protein expressed on the surface of a heterologous host, Lactococcus lactis, was sufficient to induce biofilm formation by this organism. Conclusions Overall, this work (i identifies variations in biofilm formation capacity among pathogenically different GAS strains, (ii identifies GAS surface properties that may aid in biofilm stability and, (iii establishes that the Scl1 surface protein is an important determinant of GAS biofilm, which is sufficient to enable biofilm formation in the heterologous host

  5. The cultural formation code of successfulness verticals of the U.S. ethnic groups

    Directory of Open Access Journals (Sweden)

    Liudmyla Petrashko

    2010-11-01

    Full Text Available In the article there are outlined the prospects of global economic development. There was built an evolutional model of theoretical studies of the phenomenon “culture” in the context of universal, system and value approaches. It gives the brief characteristics of the cultural assimilation model “melting crucible”. There have been determined the indicators of the successfulness verticals of the U.S. ethnic groups and made their assessment. By virtue of the author’s method is given the assessment of the comparative significance of the heterogeneous cultural codes of maternal (immigration and hosting environment of the USA, which gave the possibility to determine the factors that ensure the economic success of the American ethnic groups. The results of the research provide reasoning for the change of traditional vector of the cultures’ typology and confirm the existence of the progressive cultural codes.

  6. Formation of potential radiation risk groups to render timely targeted medical care: Lessons of Chernobyl

    International Nuclear Information System (INIS)

    Ivanov, V. K.; Kashcheev, V. V.; Zamulaeva, I. A.; Saenko, A. S.; Orlova, N. V.; Smirnova, S. G.; Korelo, A. M.; Gorsky, A. I.; Maksioutov, M. A.

    2012-01-01

    The paper discusses technology for establishing potential cancer risk groups, based on methods of molecular and radiation epidemiology. Assay of gene mutations at the T-cell receptor (TCR) locus as the method of molecular epidemiology was used for measuring the frequency of TCR-mutations in 320 nuclear workers of the Inst. of Physics and Power Engineering (IPPE). The method of radiation epidemiology was applied to the estimation of attributable risk fraction (ARF) for solid cancers in these groups. The main estimates of radiation risk after the Chernobyl accident are in close agreement with the International Commission on Radiological Protection (ICRP) Publication, 103 models published in 2007. In nuclear workers of the IPPE with ARF ≥ 10%, the increased level of TCR-mutations occurs more often (risk ratio=9.7; 95% CI: 2.9; 32.1). (authors)

  7. Oxo-group-14-element bond formation in binuclear uranium(V) pacman complexes

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Guy M.; Arnold, Polly L.; Love, Jason B. [EaStCHEM School of Chemistry, University of Edinburgh (United Kingdom)

    2013-07-29

    Simple and versatile routes to the functionalization of uranyl-derived U{sup V}-oxo groups are presented. The oxo-lithiated, binuclear uranium(V)-oxo complexes [{(py)_3LiOUO}{sub 2}(L)] and [{(py)_3LiOUO}(OUOSiMe{sub 3})(L)] were prepared by the direct combination of the uranyl(VI) silylamide ''ate'' complex [Li(py){sub 2}][(OUO)(N''){sub 3}](N''=N(SiMe{sub 3}){sub 2}) with the polypyrrolic macrocycle H{sub 4}L or the mononuclear uranyl (VI) Pacman complex [UO{sub 2}(py)(H{sub 2}L)], respectively. These oxo-metalated complexes display distinct U-O single and multiple bonding patterns and an axial/equatorial arrangement of oxo ligands. Their ready availability allows the direct functionalization of the uranyl oxo group leading to the binuclear uranium(V) oxo-stannylated complexes [{(R_3Sn)OUO}{sub 2}(L)] (R=nBu, Ph), which represent rare examples of mixed uranium/tin complexes. Also, uranium-oxo-group exchange occurred in reactions with [TiCl(OiPr){sub 3}] to form U-O-C bonds [{(py)_3LiOUO}(OUOiPr)(L)] and [(iPrOUO){sub 2}(L)]. Overall, these represent the first family of uranium(V) complexes that are oxo-functionalised by Group 14 elements. (Copyright copyright 2013 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  8. Mechanism of the Topotactic Formation of gamma-Zirconium Phosphate Covalently Pillared with Diphosphonate Groups.

    Science.gov (United States)

    Alberti, G.; Giontella, E.; Murcia-Mascarós, S.; Vivani, R.

    1998-09-07

    The topotactic reaction of gamma-ZrPO(4)[O(2)P(OH)(2)].2H(2)O (gamma-ZrP) with benzenediphosphonic acid was examined in water and in acetone-water mixtures. This reaction was found to take place in water only on the external surface of the microcrystals, and pillared compounds were never obtained, even after very long reaction times. On the contrary, covalently pillared compounds were quickly obtained in acetone-water mixtures. The mechanism of the latter topotactic reaction was investigated by determining the rate of the phosphate groups released and the rate of the benzenediphosphonates taken up by gamma-ZrP over a long time (50 days). These data showed that pillared derivatives of gamma-ZrP can be obtained because colloidal dispersions of exfoliated lamellae are formed in acetone-water mixtures. The diphosphonate group acts initially as a monovalent species, replacing only one dihydrogen phosphate group on the surface of the exfoliated gamma-lamellae. The colloidal and partially derivatized lamellae thus formed can interact with each other by forming polylamellar pillared systems. When the number of pillared lamellae exceeds a given value (usually 5-6), flocculation of the colloidal gamma-ZrP takes place. Topotactic reactions between packets of pillared lamellae may also continue in the flocculated system. Therefore, the average number of the pillared lamellae slowly increases over time.

  9. Basic Science of the Fundamentals and Dynamics of Social-Fringe Group Formation and Sustainment

    Science.gov (United States)

    2012-08-01

    USTIFY! G BELIEFS: WHAT MOTIVATES THE TERRORISTS •:• A 1-’ltmdry l.ist of 1\\lotivations: llonor, Trauma, Religion, llumtli:uion, Sugma, Feminism ...Group Grievance and Humiliation: A Tool in AI-Qaeda Propaganda •Jihad in Algeria today is YOUR hope with permission from Allah in redemption from...relational) and Morality ! 54! "Hear, Israel, the decrees and laws I declare in your hearing today . Learn them and be sure to foLlow them. The

  10. Chemically mediated group formation in soil-dwelling larvae and pupae of the beetle Trypoxylus dichotomus

    Science.gov (United States)

    Kojima, Wataru; Ishikawa, Yukio; Takanashi, Takuma

    2014-09-01

    Many insects form groups through interactions among individuals, and these are often mediated by chemical, acoustic, or visual cues and signals. In spite of the diversity of soil-dwelling insects, their aggregation behaviour has not been examined as extensively as that of aboveground species. We investigated the aggregation mechanisms of larvae of the Japanese rhinoceros beetle Trypoxylus dichotomus, which live in groups in humus soil. In two-choice laboratory tests, 2nd- and 3rd-instar larvae gathered at conspecific larvae irrespective of the kinship. The ablation of maxillae, which bear chemosensilla, abolished aggregation behaviour. Intact larvae also exhibited aggregation behaviour towards a larval homogenate. These results suggest that larval aggregation is mediated by chemical cues. We also demonstrated that the mature larvae of T. dichotomus built their pupal cells close to a mesh bag containing a conspecific pupal cell, which indicated that larvae utilize chemical cues emanating from these cells to select the pupation site. Thus, the larvae of T. dichotomus may use chemical cues from the conspecifics in two different contexts, i.e. larval aggregation and pupation site selection. Using conspecific cues, larvae may be able to choose suitable locations for foraging or building pupal cells. The results of the present study highlight the importance of chemical information in belowground ecology.

  11. Solar photovoltaics for vernacular housing in rural malaysia: towards energy security and equitability of low income groups

    OpenAIRE

    Ahmad, Nur; Byrd, Hugh

    2011-01-01

    Since the 1970s, Malaysia’s economic expansion has been powered by cheap oil and gas making it dependent on and addicted to using large amounts of fossil fuels. As a country that is primarily reliant on fossil fuels for generating power supply, Malaysia needs to take account of long-term energy security due to fossil fuel depletion and peak oil which could threaten the development of the country. The ‘South China Sea Conflict’, concerning territorial rights to the oil and gas fields of t...

  12. Formation of Silver Nanoplates Layer on Amino Group Grafted Silica Coatings

    Directory of Open Access Journals (Sweden)

    Jurgis PILIPAVICIUS

    2016-05-01

    Full Text Available In this study the self-arrangement of Ag nanoplates on (3-Aminopropyltriethoxysilane (APTES silanized silica coatings was investigated. Silica coatings were made by sol-gel method and silanized in two different ways. The first one includes silanization in acidic 2-propanol solution, the other one – in dry toluene. Coatings were silanized by using different amounts of APTES in case of silanization in 2-propanol. Silver nanoplates layer of functionalized silica coatings was obtained via self-assembly. Coatings were investigated by atomic force microscopy (AFM, water contact angle measurements (CA, FT-IR analysis, and scanning electron microscopy (SEM. Research showed that dense Ag nanoplates arrangement occurs when there is a high amount of amino groups on the surface.DOI: http://dx.doi.org/10.5755/j01.ms.22.2.8405

  13. In love and war: altruism, norm formation, and two different types of group selection.

    Science.gov (United States)

    van Veelen, Matthijs; Hopfensitz, Astrid

    2007-12-21

    We analyse simulations reported in "The co-evolution of individual behaviors and social institutions" by Bowles et al., 2003 in the Journal of Theoretical Biology 223, 135-147, and begin with distinguishing two types of group selection models. The literature does not provide different names for them, but they are shown to be fundamentally different and have quite different empirical implications. The working of the first one depends on the answer to the question "is the probability that you also are an altruist large enough", while the other needs an affirmative answer to "are our interests enough in line". The first one therefore can also be understood as a kin selection model, while the working of the second can also be described in terms of the direct benefits. The actual simulation model is a combination of the two. It is also a Markov chain, which has important implications for how the output data should be handled.

  14. Identifying priorities to improve maternal and child nutrition among the Khmu ethnic group, Laos: a formative study.

    Science.gov (United States)

    de Sa, Joia; Bouttasing, Namthipkesone; Sampson, Louise; Perks, Carol; Osrin, David; Prost, Audrey

    2013-10-01

    Chronic malnutrition in children remains highly prevalent in Laos, particularly among ethnic minority groups. There is limited knowledge of specific nutrition practices among these groups. We explored nutritional status, cultural beliefs and practices of Laos' Khmu ethnic group to inform interventions for undernutrition as part of a Primary Health Care (PHC) project. Mixed methods were used. For background, we disaggregated anthropometric and behavioural indicators from Laos' Multiple Indicator Cluster Survey. We then conducted eight focus group discussions and 33 semi-structured interviews with Khmu villagers and health care workers, exploring beliefs and practices related to nutrition. The setting was two rural districts in Luang Prabang province, in one of which the PHC project had been established for 3 years. There was a higher prevalence of stunting in the Khmu than in other groups. Disaggregation showed nutrition behaviours were associated with ethnicity, including exclusive breastfeeding. Villagers described strong adherence to post-partum food restrictions for women, while little change was described in intake during pregnancy. Most children were breastfed, although early introduction of pre-lacteal foods was noted in the non-PHC district. There was widespread variation in introduction and diversity of complementary foods. Guidance came predominantly from the community, with some input from health care workers. Interventions to address undernutrition in Khmu communities should deliver clear, consistent messages on optimum nutrition behaviours. Emphasis should be placed on dietary diversity for pregnant and post-partum mothers, encouraging exclusive breastfeeding and timely, appropriate complementary feeding. The impact of wider governmental policies on food security needs to be further assessed. © 2012 John Wiley & Sons Ltd.

  15. S-Lagrangian dynamics of many-body systems and behavior of social groups: Dominance and hierarchy formation

    Science.gov (United States)

    Sandler, U.

    2017-11-01

    In this paper, we extend our generalized Lagrangian dynamics (i.e., S-Lagrangian dynamics, which can be applied equally to physical and non-physical systems as per Sandler (2014)) to many-body systems. Unlike common Lagrangian dynamics, this is not a trivial task. For many-body systems with S-dependent Lagrangians, the Lagrangian and the corresponding Hamiltonian or energy become vector functions, conjugated momenta become second-order tensors, and the system inevitably develops a hierarchical structure, even if all bodies initially have similar status and Lagrangians. As an application of our theory, we consider dominance and hierarchy formation, which is present in almost all communities of living species. As a biological basis for this application, we assume that the primary motivation of a groups activity is to attempt to cope with stress arising as pressure from the environment and from intrinsic unmet needs of individuals. It has been shown that the S-Lagrangian approach to a group's evolution naturally leads to formation of linear or despotic dominance hierarchies, depending on differences between individuals in coping with stress. That is, individuals that cope more readily with stress take leadership roles during the evolution. Experimental results in animal groups which support our assumption and findings are considered.

  16. Revisiting the merits of a mandatory large group classroom learning format: an MD-MBA perspective.

    Science.gov (United States)

    Li, Shawn X; Pinto-Powell, Roshini

    2017-01-01

    The role of classroom learning in medical education is rapidly changing. To promote active learning and reduce student stress, medical schools have adopted policies such as pass/fail curriculums and recorded lectures. These policies along with the rising importance of the USMLE (United States Medical Licensing Examination) exams have made asynchronous learning popular to the detriment of classroom learning. In contrast to this model, modern day business schools employ mandatory large group classes with assigned seating and cold-calling. Despite similar student demographics, medical and business schools have adopted vastly different approaches to the classroom. When examining the classroom dynamic at business schools with mandatory classes, it is evident that there's an abundance of engaging discourse and peer learning objectives that medical schools share. Mandatory classes leverage the network effect just like social media forums such as Facebook and Twitter. That is, the value of a classroom discussion increases when more students are present to participate. At a time when students are savvy consumers of knowledge, the classroom is competing against an explosion of study aids dedicated to USMLE preparation. Certainly, the purpose of medical school is not solely about the efficient transfer of knowledge - but to train authentic, competent, and complete physicians. To accomplish this, we must promote the inimitable and deeply personal interactions amongst faculty and students. When viewed through this lens, mandatory classes might just be a way for medical schools to leverage their competitive advantage in educating the complete physician.

  17. Group A Streptococcus Prevents Mast Cell Degranulation to Promote Extracellular Trap Formation

    Directory of Open Access Journals (Sweden)

    Mary Clark

    2018-02-01

    Full Text Available The resurgence of Group A Streptococcus (GAS infections in the past two decades has been a rising major public health concern. Due to a large number of GAS infections occurring in the skin, mast cells (MCs, innate immune cells known to localize to the dermis, could play an important role in controlling infection. MCs can exert their antimicrobial activities either early during infection, by degranulation and release of antimicrobial proteases and the cathelicidin-derived antimicrobial peptide LL-37, or by forming antibacterial MC extracellular traps (MCETs in later stages of infection. We demonstrate that MCs do not directly degranulate in response to GAS, reducing their ability to control bacterial growth in early stages of infection. However, MC granule components are highly cytotoxic to GAS due to the pore-forming activity of LL-37, while MC granule proteases do not significantly affect GAS viability. We therefore confirmed the importance of MCETs by demonstrating their capacity to reduce GAS survival. The data therefore suggests that LL-37 from MC granules become embedded in MCETs, and are the primary effector molecule by which MCs control GAS infection. Our work underscores the importance of a non-traditional immune effector cell, utilizing a non-conventional mechanism, in the defense against an important human pathogen.

  18. Archean Age Fossils from Northwestern Australia (Approximately 3.3 to 3.5 GA, Warrawoona Group, Towers Formation)

    Science.gov (United States)

    Smith, Penny A. Morris

    1999-01-01

    Archean aged rocks from the Pilbara Block area of western Australia (Warrawoona Group, Towers Formation, -3.3-3.5 Ga) contain microfossils that are composed of various sizes of spheres and filaments. The first descriptions of these microfossils were published in the late 1970's (Dunlop, 1978; Dunlop, et. al., 1978). The authenticity of the microfossils is well established. The small size of the microfossils prevents isotope dating, at least with the present technology. Microbiologists, however, have established guidelines to determine the authenticity of the Archean aged organic remains (Schopf, Walter, 1992).

  19. Geochemistry and geochronology of the Archean and palaeo-Proterozoic formations of southern Cameroon (Ntem group, Congo craton)

    International Nuclear Information System (INIS)

    Rchameni, R.

    1997-01-01

    The aim of this work is to understand the crustal evolution of the NW margin of the Congo craton using structural, petrography, isotopic, geochemical and geochronological studies of the Archean and palaeo-Proterozoic formations of the Ntem group of southern Cameroon. The synthesis of these studies allows to propose a diapir-type gravity model linked with the genesis of granitoids to explain the geodynamical evolution of this part of the craton during the Archean. A convergence model with the collision of the Congo and Sao-Francisco cratons and with crust thickening followed by a relaxation phase is proposed for the palaeo-Proterozoic. (J.S.)

  20. Distal alluvial fan sediments in early Proterozoic red beds of the Wilgerivier formation, Waterberg Group, South Africa

    Science.gov (United States)

    Van Der Neut, M.; Eriksson, P. G.; Callaghan, C. C.

    The 1900 - 1700 M.a. Waterberg Group belongs to a series of southern African cratonic cover sequences of roughly equivalent age. Red beds of the Wilgerivier Formation comprise sandstones, interbedded with subordinate conglomerates and minor mudrocks. These immature sedimentary rocks exhibit lenticular bedding, radial palaeocurrent patterns and features indicative of both streamflow and gravity-flow deposition. A distal wet alluvial fan palaeoenvironmental setting is envisaged, with fan-deltas forming where alluvial lobes prograded into a lacustrine basin. Intrastratal, diagenetic alteration of ferromagnesian detrital grains and ferruginous grain coatings led to the red colouration of the Wilgerivier sediments.

  1. The Pan-STARRS1 Medium-deep Survey: Star Formation Quenching in Group and Cluster Environments

    Energy Technology Data Exchange (ETDEWEB)

    Jian, Hung-Yu; Lin, Lihwai; Lin, Kai-Yang; Chen, Chin-Wei [Institute of Astronomy and Astrophysics, Academia Sinica, 106, Taipei, Taiwan, R.O.C. (China); Foucaud, Sebastien [Department of Earth Sciences, National Taiwan Normal University, N.88, Tingzhou Road, Sec. 4, Taipei 11677, Taiwan, R.O.C. (China); Chiueh, Tzihong [Department of Physics, National Taiwan University, 106, Taipei, Taiwan, R.O.C. (China); Bower, R. G.; Cole, Shaun; Draper, P. W.; Metcalfe, N. [Institute for Computational Cosmology, Department of Physics, Durham University, South Road, Durham DH1 3LE (United Kingdom); Chen, Wen-Ping [Graduate Institute of Astronomy, National Central University, Chung-Li 32054, Taiwan, R.O.C. (China); Burgett, W. S.; Flewelling, H.; Huber, M. E.; Kaiser, N.; Kudritzki, R.-P.; Magnier, E. A.; Wainscoat, R. J.; Waters, C., E-mail: hyjian@asiaa.sinica.edu.tw [Institute for Astronomy, University of Hawaii at Manoa, Honolulu, HI 96822 (United States)

    2017-08-10

    We make use of a catalog of 1600 Pan-STARRS1 groups produced by the probability friends-of-friends algorithm to explore how the galaxy properties, i.e., the specific star formation rate (SSFR) and quiescent fraction, depend on stellar mass and group-centric radius. The work is the extension of Lin et al. In this work, powered by a stacking technique plus a background subtraction for contamination removal, a finer correction and more precise results are obtained than in our previous work. We find that while the quiescent fraction increases with decreasing group-centric radius, the median SSFRs of star-forming galaxies in groups at fixed stellar mass drop slightly from the field toward the group center. This suggests that the main quenching process in groups is likely a fast mechanism. On the other hand, a reduction in SSFRs by ∼0.2 dex is seen inside clusters as opposed to the field galaxies. If the reduction is attributed to the slow quenching effect, the slow quenching process acts dominantly in clusters. In addition, we also examine the density–color relation, where the density is defined by using a sixth-nearest-neighbor approach. Comparing the quiescent fractions contributed from the density and radial effect, we find that the density effect dominates the massive group or cluster galaxies, and the radial effect becomes more effective in less massive galaxies. The results support mergers and/or starvation as the main quenching mechanisms in the group environment, while harassment and/or starvation dominate in clusters.

  2. Migros-3: a code for the generation of group constants for reactor calculations from neutron nuclear data in KEDAK format

    International Nuclear Information System (INIS)

    Broeders, I.; Krieg, B.

    1977-01-01

    The code MIGROS-3 was developed from MIGROS-2. The main advantage of MIGROS-3 is its compatibility with the new conventions of the latest version of the Karlsruhe nuclear data library, KEDAK-3. Moreover, to some extent refined physical models were used and numerical methods were improved. MIGROS-3 allows the calculation of microscopic group cross sections of the ABBN type from isotopic neutron data given in KEDAK-format. All group constants, necessary for diffusion-, consistent P 1 - and Ssub(N)-calculations can be generated. Anisotropy of elastic scattering can be taken into account up to P 5 . A description of the code and the underlying theory is given. The input and output description, a sample problem and the program lists are provided. (orig.) [de

  3. Temporal formation of optical anisotropy and surface relief during polarization holographic recording in polymethylmethacrylate with azobenzene side groups

    Science.gov (United States)

    Sasaki, Tomoyuki; Izawa, Masahiro; Noda, Kohei; Nishioka, Emi; Kawatsuki, Nobuhiro; Ono, Hiroshi

    2014-03-01

    The formation of polarization holographic gratings with both optical anisotropy and surface relief (SR) deformation was studied for polymethylmethacrylate with azobenzene side groups. Temporal contributions of isotropic and anisotropic phase gratings were simultaneously determined by observing transitional intensity and polarization states of the diffraction beams and characterizing by means of Jones calculus. To clarify the mechanism of SR deformation, cross sections of SR were characterized based on the optical gradient force model; experimental observations were in good agreement with the theoretical expectation. We clarified that the anisotropic phase change originating in the reorientation of the azobenzene side groups was induced immediately at the beginning of the holographic recording, while the response time of the isotropic phase change originating in the molecular migration due to the optical gradient force was relatively slow.

  4. The star formation histories of local group dwarf galaxies. I. Hubble space telescope/wide field planetary camera 2 observations

    Energy Technology Data Exchange (ETDEWEB)

    Weisz, Daniel R. [Department of Astronomy, University of California at Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Dolphin, Andrew E. [Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756 (United States); Skillman, Evan D. [Minnesota Institute for Astrophysics, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States); Holtzman, Jon [Department of Astronomy, New Mexico State University, Box 30001, 1320 Frenger Street, Las Cruces, NM 88003 (United States); Gilbert, Karoline M.; Dalcanton, Julianne J.; Williams, Benjamin F., E-mail: drw@ucsc.edu [Department of Astronomy, University of Washington, Box 351580, Seattle, WA 98195 (United States)

    2014-07-10

    We present uniformly measured star formation histories (SFHs) of 40 Local Group (LG) dwarf galaxies based on color-magnitude diagram (CMD) analysis from archival Hubble Space Telescope imaging. We demonstrate that accurate SFHs can be recovered from CMDs that do not reach the oldest main sequence turn-off (MSTO), but emphasize that the oldest MSTO is critical for precisely constraining the earliest epochs of star formation. We find that: (1) the average lifetime SFHs of dwarf spheroidals (dSphs) can be approximated by an exponentially declining SFH with τ ∼ 5 Gyr; (2) lower luminosity dSphs are less likely to have extended SFHs than more luminous dSphs; (3) the average SFHs of dwarf irregulars (dIrrs), transition dwarfs, and dwarf ellipticals can be approximated by the combination of an exponentially declining SFH (τ ∼ 3-4 Gyr) for lookback ages >10-12 Gyr ago and a constant SFH thereafter; (4) the observed fraction of stellar mass formed prior to z = 2 ranges considerably (80% for galaxies with M < 10{sup 5} M{sub ☉} to 30% for galaxies with M > 10{sup 7} M{sub ☉}) and is largely explained by environment; (5) the distinction between 'ultra-faint' and 'classical' dSphs is arbitrary; (6) LG dIrrs formed a significantly higher fraction of stellar mass prior to z = 2 than the Sloan Digital Sky Survey galaxies from Leitner and the SFHs from the abundance matching models of Behroozi et al. This may indicate higher than expected star formation efficiencies at early times in low mass galaxies. Finally, we provide all the SFHs in tabulated electronic format for use by the community.

  5. The star formation histories of local group dwarf galaxies. I. Hubble space telescope/wide field planetary camera 2 observations

    International Nuclear Information System (INIS)

    Weisz, Daniel R.; Dolphin, Andrew E.; Skillman, Evan D.; Holtzman, Jon; Gilbert, Karoline M.; Dalcanton, Julianne J.; Williams, Benjamin F.

    2014-01-01

    We present uniformly measured star formation histories (SFHs) of 40 Local Group (LG) dwarf galaxies based on color-magnitude diagram (CMD) analysis from archival Hubble Space Telescope imaging. We demonstrate that accurate SFHs can be recovered from CMDs that do not reach the oldest main sequence turn-off (MSTO), but emphasize that the oldest MSTO is critical for precisely constraining the earliest epochs of star formation. We find that: (1) the average lifetime SFHs of dwarf spheroidals (dSphs) can be approximated by an exponentially declining SFH with τ ∼ 5 Gyr; (2) lower luminosity dSphs are less likely to have extended SFHs than more luminous dSphs; (3) the average SFHs of dwarf irregulars (dIrrs), transition dwarfs, and dwarf ellipticals can be approximated by the combination of an exponentially declining SFH (τ ∼ 3-4 Gyr) for lookback ages >10-12 Gyr ago and a constant SFH thereafter; (4) the observed fraction of stellar mass formed prior to z = 2 ranges considerably (80% for galaxies with M < 10 5 M ☉ to 30% for galaxies with M > 10 7 M ☉ ) and is largely explained by environment; (5) the distinction between 'ultra-faint' and 'classical' dSphs is arbitrary; (6) LG dIrrs formed a significantly higher fraction of stellar mass prior to z = 2 than the Sloan Digital Sky Survey galaxies from Leitner and the SFHs from the abundance matching models of Behroozi et al. This may indicate higher than expected star formation efficiencies at early times in low mass galaxies. Finally, we provide all the SFHs in tabulated electronic format for use by the community.

  6. A green non-acid-catalyzed process for direct N=N-C group formation: comprehensive study, modeling, and optimization.

    Science.gov (United States)

    Khakyzadeh, Vahid; Zolfigol, Mohammad Ali; Derakhshan-Panah, Fatemeh; Jafarian, Majid; Miri, Mir Vahid; Gilandoust, Maryam

    2018-01-04

    The aim of this work is to introduce, model, and optimize a new non-acid-catalyzed system for a direct N[Formula: see text]N-C bond formation. By reacting naphthols or phenol with anilines in the presence of the sodium nitrite as nitrosonium ([Formula: see text] source and triethylammonium acetate (TEAA), a N[Formula: see text]N-C group can be formed in non-acid media. Modeling and optimization of the reaction conditions were investigated by response surface method. Sodium nitrite, TEAA, and water were chosen as variables, and reaction yield was also monitored. Analysis of variance indicates that a second-order polynomial model with F value of 35.7, a P value of 0.0001, and regression coefficient of 0.93 is able to predict the response. Based on the model, the optimum process conditions were introduced as 2.2 mmol sodium nitrite, 2.2 mL of TEAA, and 0.5 mL [Formula: see text] at room temperature. A quadratic (second-order) polynomial model, by analysis of variance, was able to predict the response for a direct N=N-C group formation. Predicted response values were in good agreement with the experimental values. Electrochemistry studies were done to introduce new Michael acceptor moieties. Broad scope, high yields, short reaction time, and mild conditions are some advantages of the presented method.

  7. How does the color influence figure and shape formation, grouping, numerousness and reading? The role of chromatic wholeness and fragmentation.

    Science.gov (United States)

    Pinna, Baingio; Uccula, Arcangelo; Tanca, Maria

    2010-09-01

    In this work it is suggested that color induces phenomenal wholeness, part-whole organization and fragmentation. The phenomenal wholeness subsumes the set of its main attributes: homogeneity, continuity, univocality, belongingness, and oneness. If color induces wholeness, it can also induce fragmentation. Therefore, in order to understand the role played by color within the process of part-whole organization, color is used both as a wholeness and as a fragmentation tool, thus operating synergistically or antagonistically with other wholeness processes. Therefore, color is expected to influence figure-ground segregation, grouping, shape formation and other visual processes that are related to the phenomenal wholeness. The purpose of this study is to rate the influence of color in inducing whole and part-whole organization and, consequently, in determining the perception of figure-ground segregation, grouping, shape formation, numerousness evaluation and time reading. We manipulated experimental conditions by using equiluminant colors to favor or break (parcel-out) the wholeness of objects like geometrical composite figures and words. The results demonstrated that color is aimed, among other psychological and biological purposes, at: (1) relating each chromatic component of an object, thus favoring the emergence of the whole object; (2) eliciting a part-whole organization, whose components are interdependent; (3) eliciting fragments and then breaking up the whole and favoring the emergence of single components. Wholeness, part-whole organization and fragmentation can be considered as three further purposes of color. © 2010 The Authors, Ophthalmic and Physiological Optics © 2010 The College of Optometrists.

  8. Healthy Body Image Intervention Delivered to Young Women via Facebook Groups: Formative Study of Engagement and Acceptability.

    Science.gov (United States)

    Stapleton, Jerod L; Manne, Sharon L; Day, Ashley K; Levonyan-Radloff, Kristine; Pagoto, Sherry L

    2018-02-20

    There is increasing interest in using social media sites such as Facebook to deliver health interventions so as to expose people to content while they are engaging in their usual social media habit. This formative intervention development study is novel in describing a preliminary test of using the secret group feature of Facebook to deliver a behavioral intervention targeting users of indoor tanning beds to reduce their risk of skin cancer. Intervention content was designed to challenge body image-related constructs associated with indoor tanning through the use of dissonance-inducing content. To evaluate engagement with and acceptability of using a secret Facebook group to deliver a healthy body image intervention to young women engaged in indoor tanning. Seventeen young women completed a baseline survey and joined a secret Facebook group with intervention content delivered via daily posts for 4 weeks. Engagement data was extracted and acceptability was measured via a follow-up survey. The study had a high retention rate (94%, [16/17]). On average, posts were viewed by 91% of participants, liked by 35%, and commented on by 26%. The average comment rate was highest (65%) for posts that elicited comments by directly posing questions or discussion topics to the group. Average intervention acceptability ratings were highly positive and participants reported feeling connected to the group and its topic. Average rates of past 1-month indoor tanning reported following the intervention were lower than the baseline rate (P=.08, Cohen d=0.47). This study is novel in demonstrating participant engagement with and acceptability of using Facebook secret groups to deliver a dissonance-inducing intervention approach that utilizes group-based discussions related to body image. The study is also unique within the field of skin cancer prevention by demonstrating the potential value of delivering an indoor tanning intervention within an interactive social media format. The findings

  9. Healthy Body Image Intervention Delivered to Young Women via Facebook Groups: Formative Study of Engagement and Acceptability

    Science.gov (United States)

    Manne, Sharon L; Day, Ashley K; Levonyan-Radloff, Kristine; Pagoto, Sherry L

    2018-01-01

    Background There is increasing interest in using social media sites such as Facebook to deliver health interventions so as to expose people to content while they are engaging in their usual social media habit. This formative intervention development study is novel in describing a preliminary test of using the secret group feature of Facebook to deliver a behavioral intervention targeting users of indoor tanning beds to reduce their risk of skin cancer. Intervention content was designed to challenge body image-related constructs associated with indoor tanning through the use of dissonance-inducing content. Objective To evaluate engagement with and acceptability of using a secret Facebook group to deliver a healthy body image intervention to young women engaged in indoor tanning. Methods Seventeen young women completed a baseline survey and joined a secret Facebook group with intervention content delivered via daily posts for 4 weeks. Engagement data was extracted and acceptability was measured via a follow-up survey. Results The study had a high retention rate (94%, [16/17]). On average, posts were viewed by 91% of participants, liked by 35%, and commented on by 26%. The average comment rate was highest (65%) for posts that elicited comments by directly posing questions or discussion topics to the group. Average intervention acceptability ratings were highly positive and participants reported feeling connected to the group and its topic. Average rates of past 1-month indoor tanning reported following the intervention were lower than the baseline rate (P=.08, Cohen d=0.47). Conclusions This study is novel in demonstrating participant engagement with and acceptability of using Facebook secret groups to deliver a dissonance-inducing intervention approach that utilizes group-based discussions related to body image. The study is also unique within the field of skin cancer prevention by demonstrating the potential value of delivering an indoor tanning intervention within

  10. Personality, Parasites, Political Attitudes, and Cooperation: A Model of How Infection Prevalence Influences Openness and Social Group Formation.

    Science.gov (United States)

    Brown, Gordon D A; Fincher, Corey L; Walasek, Lukasz

    2016-01-01

    What is the origin of individual differences in ideology and personality? According to the parasite stress hypothesis, the structure of a society and the values of individuals within it are both influenced by the prevalence of infectious disease within the society's geographical region. High levels of infection threat are associated with more ethnocentric and collectivist social structures and greater adherence to social norms, as well as with socially conservative political ideology and less open but more conscientious personalities. Here we use an agent-based model to explore a specific opportunities-parasites trade-off (OPTO) hypothesis, according to which utility-maximizing agents place themselves at an optimal point on a trade-off between (a) the gains that may be achieved through accessing the resources of geographically or socially distant out-group members through openness to out-group interaction, and (b) the losses arising due to consequently increased risks of exotic infection to which immunity has not been developed. We examine the evolution of cooperation and the formation of social groups within social networks, and we show that the groups that spontaneously form exhibit greater local rather than global cooperative networks when levels of infection are high. It is suggested that the OPTO model offers a first step toward understanding the specific mechanisms through which environmental conditions may influence cognition, ideology, personality, and social organization. Copyright © 2015 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society.

  11. Biofilm formation of beta-hemolytic group G Streptococcus dysgalactiae subspecies equisimilis isolates and its association with emm polymorphism.

    Science.gov (United States)

    Ma, Jui-Shan; Chen, Sin-Yu; Lo, Hsueh-Hsia

    2017-11-01

    Biofilm formation has been well known as a determinant of bacterial virulence. Group G Streptococcus dysgalactiae subspecies equisimilis (SDSE), a relevant pathogen with increasing medical importance, was evaluated for the biofilm-forming potential. Microtiter plate assay was used to assess the most feasible medium for group G SDSE to form a biofilm. Among 246 SDSE isolates examined, 46.7%, 43.5%, 33.3%, and 26.4% of isolates showed moderate or strong biofilm-forming abilities using tryptic soy broth (TSB), brain heart infusion broth (BHI), Todd-Hewitt broth (THB), and C medium with 30 mM glucose (CMG), respectively. The addition of glucose significantly increased the biofilm-forming ability of group G SDSE. FCT (fibronectin-collagen-T-antigen) typing of SDSE was first undertaken and 11 FCT types were found. Positive associations of stG10.0 or negative associations of stG245.0, stG840.0, and stG6.1 with biofilm-forming ability of SDSE were, respectively, found. This was the first investigation demonstrating biofilm-forming potential in clinical group G SDSE isolates; also, some significant associations of biofilm-forming ability with certain emm types were presented. © 2017 APMIS. Published by John Wiley & Sons Ltd.

  12. Constraining the Nature of Dark Matter with the Star-formation History of the Faintest Local Group Dwarf Galaxy Satellites

    International Nuclear Information System (INIS)

    Chau, Alice; Mayer, Lucio; Governato, Fabio

    2017-01-01

    Λ warm dark matter (ΛWDM), realized by collisionless particles of 1–3 keV, has been proposed as an alternative scenario to Λ-Cold-Dark Matter (ΛCDM) for the dwarf galaxy scale discrepancies. We present an approach to test the viability of such WDM models using star-formation histories (SFHs) of the dwarf spheroidal galaxies (dSphs) in the Local Group. We compare their high-time-resolution SFHs with the collapse redshift of their dark halos in CDM and WDM. Collapse redshift is inferred after determining the subhalo infall mass. This is based on the dwarf current mass inferred from stellar kinematics, combined with cosmological simulation results on subhalo evolution. WDM subhalos close to the filtering mass scale, forming significantly later than CDM, are the most difficult to reconcile with early truncation of star formation ( z ≥ 3). The ultra-faint dwarfs (UFDs) provide the most stringent constraints. Using six UFDs and eight classical dSphs, we show that a 1 keV particle is strongly disfavored, consistently with other reported methods. Excluding other models is only hinted for a few UFDs. Other UFDs for which the lack of robust constraints on halo mass prevents us from carrying out our analysis rigorously, show a very early onset of star formation that will strengthen the constraints delivered by our method in the future. We discuss the various caveats, notably the low number of dwarfs with accurately determined SFHs and the uncertainties when determining the subhalo infall mass, most notably the baryonic physics. Our preliminary analysis may serve as a pathfinder for future investigations that will combine accurate SFHs for local dwarfs with direct analysis of WDM simulations with baryons.

  13. Constraining the Nature of Dark Matter with the Star-formation History of the Faintest Local Group Dwarf Galaxy Satellites

    Energy Technology Data Exchange (ETDEWEB)

    Chau, Alice; Mayer, Lucio [Center for Theoretical Astrophysics and Cosmology, Institute for Computational Science, University of Zurich, Winterthurerstrasse 190, CH-8057 Zürich (Switzerland); Governato, Fabio [Astronomy Department, University of Washington, Box 351580, Seattle, WA 98195-1580 (United States)

    2017-08-10

    Λ warm dark matter (ΛWDM), realized by collisionless particles of 1–3 keV, has been proposed as an alternative scenario to Λ-Cold-Dark Matter (ΛCDM) for the dwarf galaxy scale discrepancies. We present an approach to test the viability of such WDM models using star-formation histories (SFHs) of the dwarf spheroidal galaxies (dSphs) in the Local Group. We compare their high-time-resolution SFHs with the collapse redshift of their dark halos in CDM and WDM. Collapse redshift is inferred after determining the subhalo infall mass. This is based on the dwarf current mass inferred from stellar kinematics, combined with cosmological simulation results on subhalo evolution. WDM subhalos close to the filtering mass scale, forming significantly later than CDM, are the most difficult to reconcile with early truncation of star formation ( z ≥ 3). The ultra-faint dwarfs (UFDs) provide the most stringent constraints. Using six UFDs and eight classical dSphs, we show that a 1 keV particle is strongly disfavored, consistently with other reported methods. Excluding other models is only hinted for a few UFDs. Other UFDs for which the lack of robust constraints on halo mass prevents us from carrying out our analysis rigorously, show a very early onset of star formation that will strengthen the constraints delivered by our method in the future. We discuss the various caveats, notably the low number of dwarfs with accurately determined SFHs and the uncertainties when determining the subhalo infall mass, most notably the baryonic physics. Our preliminary analysis may serve as a pathfinder for future investigations that will combine accurate SFHs for local dwarfs with direct analysis of WDM simulations with baryons.

  14. A challenge to dSph formation models: are the most isolated Local Group dSph galaxies truly old?

    Science.gov (United States)

    Monelli, Matteo

    2017-08-01

    What is the origin of the different dwarf galaxy types? The classification into dwarf irregular (dIrr), spheroidal (dSph), and transition (dT) types is based on their present-day properties. However, star formation histories (SFHs) reconstructed from deep color-magnitude diagrams (CMDs) provide details on the early evolution of galaxies of all these types, and indicate only two basic evolutionary paths. One is characterized by a vigorous but brief initial star-forming event, and little or no star formation thereafter (fast evolution), and the other one by roughly continuous star formation until (nearly) the present time (slow evolution). These two paths do not map directly onto the dIrr, dT and dSph types. Thus, the present galaxy properties do not reflect their lifetime evolution. Since there are some indications that slow dwarfs were assembled in lower-density environments than fast dwarfs, Gallart et al (2015) proposed that the distinction between fast and slow dwarfs reflects the characteristic density of the environment where they formed. This scenario, and more generally scenarios where dSph galaxies formed through the interaction with a massive galaxy, are challenged by a small sample of extremely isolated dSph/dT in the outer fringes of the Local Group. This proposal targets two of these objects (VV124, KKR25) for which we will infer their SFH - through a novel technique that combines the information from their RR Lyrae stars and deep CMDs sampling the intermediate-age population - in order to test these scenarios. This is much less demanding on observing time than classical SFH derivation using full depth CMDs.

  15. Methodical aspects of group work organization of the trainees in the professional development programs in long distance format

    Directory of Open Access Journals (Sweden)

    Igor A. Valdman

    2017-01-01

    Full Text Available In Russia and abroad the teamwork gained popularity in the labor market as a form of collective interaction between multiprofessional groups of specialists in implementing business projects, carrying out research and development projects, designing technological solutions and creating innovative products. At the same time, in the educational practice, especially when using distant educational technologies, the command method of instruction is quite rare. The reason for this is that the teamwork in the implementation of educational programs requires fixating individual educational outcomes of each trainee, their contribution to the performance of the group task. It complicates the organization of the educational process. As the result, educational organizations do not often use this educational form because of the complexity of its application in the conduct of intermediate and final attestation.Research goal. search and validation of a problem solution that can be formulated as a contradiction between the need to perform group homework assignments in distant learning and the necessity to fix the individual educational results of each trainee for the purpose of intermediate and final attestation. The authors of the article offer basic methodological principles that allow finding the balance in-between the requirements of legislation and preserving the team approach in the process of group work of trainees.Materials and methods. The initial materials of the research are an overview of existing publications on the organization of teamwork of trainees is used, including the implementation of training in a long distance format, the legislation of the Russian Federation regarding interim and final certification of trainees, as well as practical experience in implementing training programs, based on ANO “E-learning for Nanoindustry (“eNano””. Based on these materials, the authors offer basic methodological principles, obtained empirically and

  16. SSX2 is a novel DNA-binding protein that antagonizes polycomb group body formation and gene repression

    DEFF Research Database (Denmark)

    Gjerstorff, Morten Frier; Relster, Mette Marie; Greve, Katrine Buch Viden

    2014-01-01

    Polycomb group (PcG) complexes regulate cellular identity through epigenetic programming of chromatin. Here, we show that SSX2, a germline-specific protein ectopically expressed in melanoma and other types of human cancers, is a chromatin-associated protein that antagonizes BMI1 and EZH2 PcG body...... formation and derepresses PcG target genes. SSX2 further negatively regulates the level of the PcG-associated histone mark H3K27me3 in melanoma cells, and there is a clear inverse correlation between SSX2/3 expression and H3K27me3 in spermatogenesis. However, SSX2 does not affect the overall composition...

  17. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    Directory of Open Access Journals (Sweden)

    Ali Abdul Kadir Ali

    2015-07-01

    Full Text Available This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security refers to the general safety of inhabitants and the protection of human rights. This paper compares the security situation in so-called ‘rebel-held’ areas of Syria where alternative governance structures have emerged, examining the security approaches of Local Administrative Councils and Rebel Councils in Deir Azzor, Manbij, Dera, and areas dominated by the Kurdish Democratic Union Party (PYD. It argues that security and safety are strongly influenced by authority formation and the nature of deals and relationships involved in the formation of these nascent authorities. It also argues that security in these areas is strongly influenced by the Syrian government, which disrupts collectives that threaten its own collective security while giving limited support to those which serve its agenda of retaining power. It also demonstrates the limited utility of the ‘regime’ vs. ‘rebel-held’ dichotomy, as rebel groups at times must accommodate the Syrian state in limited ways for instrumental purposes. The article is based on fieldwork conducted in Turkey in 2013–2014, interviews conducted in 2015, and secondary sources based on field research.

  18. Unusual C-C bond cleavage in the formation of amine-bis(phenoxy) group 4 benzyl complexes: Mechanism of formation and application to stereospecific polymerization

    KAUST Repository

    Gowda, Ravikumar R.

    2014-08-11

    Group 4 tetrabenzyl compounds MBn4 (M = Zr, Ti), upon protonolysis with an equimolar amount of the tetradentate amine-tris(phenol) ligand N[(2,4-tBu2C6H2(CH 2)OH]3 in toluene from -30 to 25 °C, unexpectedly lead to amine-bis(phenoxy) dibenzyl complexes, BnCH2N[(2,4- tBu2C6H2(CH2)O] 2MBn2 (M = Zr (1), Ti (2)) in 80% (1) and 75% (2) yields. This reaction involves an apparent cleavage of the >NCH2-ArOH bond (loss of the phenol in the ligand) and formation of the >NCH 2-CH2Bn bond (gain of the benzyl group in the ligand). Structural characterization of 1 by X-ray diffraction analysis confirms that the complex formed is a bis(benzyl) complex of Zr coordinated by a newly derived tridentate amine-bis(phenoxy) ligand arranged in a mer configuration in the solid state. The abstractive activation of 1 and 2 with B(C6F 5)3·THF in CD2Cl2 at room temperature generates the corresponding benzyl cations {BnCH2N[(2,4- tBu2C6H2(CH2)O] 2MBn(THF)}+[BnB(C6F5) 3]- (M = Zr (3), Ti, (4)). These cationic complexes, along with their analogues derived from (imino)phenoxy tri- and dibenzyl complexes, [(2,6-iPr2C6H3)N=C(3,5- tBu2C6H2)O]ZrBn3 (5) and [2,4-Br2C6H2(O)(6-CH2(NC 5H9))CH2N=CH(2-adamantyl-4-MeC 6H2O)]ZrBn2 (6), have been found to effectively polymerize the biomass-derived renewable β-methyl-α-methylene- γ-butyrolactone (βMMBL) at room temperature into the highly stereoregular polymer PβMMBL with an isotacticity up to 99% mm. A combined experimental and DFT study has yielded a mechanistic pathway for the observed unusual C-C bond cleavage in the present protonolysis reaction between ZrBn4 and N[(2,4-tBu2C 6H2(CH2)OH]3 for the formation of complex 1, which involves the benzyl radical and the Zr(III) species, resulting from thermal and photochemical decomposition of ZrBn4, followed by a series of reaction sequences consisting of protonolysis, tautomerization, H-transfer, oxidation, elimination, and radical coupling. © 2014 American Chemical Society.

  19. Arbuscular mycorrhizal fungi reveal distinct patterns of anastomosis formation and hyphal healing mechanisms between different phylogenic groups

    NARCIS (Netherlands)

    De Souza, F.A.; Fernández, F.; Delmas, N.S.; Declerck, S.

    2005-01-01

    The significance of anastomosis formation and the hyphal healing mechanism (HHM) for functionality and integrity of the arbuscular mycorrhizal (AM) fungal mycelial network remains poorly documented. Four Glomeraceae and three Gigasporaceae were cultured monoxenically. Anastomosis formation was

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Translating group programmes into online formats: establishing the acceptability of a parents' sex and relationships communication serious game.

    Science.gov (United States)

    Bayley, Julie E; Brown, Katherine E

    2015-12-09

    to feedback text volume. A manualised group programme can be viably converted into a serious game format which is both cognitively and emotionally acceptable. The intervention may be more effectively targeted at parents with younger children, and further game developments must particularly address information dosing. Establishing the viability of digitally converting a group programme is a significant step forward for implementation focused research.

  3. A new squamate lizard from the Upper Cretaceous Adamantina Formation (Bauru Group, São Paulo State, Brazil

    Directory of Open Access Journals (Sweden)

    William R. Nava

    2011-03-01

    Full Text Available The record of non-mosasaur squamates (Reptilia, Squamata is sparse in the Cretaceus fossil record of Brazil and include six putative reports, three from the Aptian-Albian of the Araripe Basin (Tijubina pontei Bonfim-Júnior and Marques, Olindalacerta brasiliensis Evans and Yabumoto, and a lizard indet. and three from the Upper Cretaceous of the Bauru Group (Pristiguana brasiliensis Estes and Price, Anilioidae gen. et sp. indet., and Squamata gen. et sp. indet.. In this contribution, a new genus and species of lizard, Brasiliguana prudentis gen. et sp. nov., is described based on an isolated left maxilla with teeth. The material was discovered in an outcrop of the Upper Cretaceous Adamantina Formation (Bauru Group located in the proximity of Presidente Prudente Municipality, São Paulo State, Brazil. The new taxon is considered a basal non-Priscagamidae+Acrodonta iguanian based on the presence of a weakly inclined anterior margin of the maxillary nasal process and maxillary tooth shape and tooth implantation similar to that of iguanians rather than of other lizard groups (e.g. teiids. This finding significantly increases the squamate lizard diversity of South America, which is still poorly understood and sparsely represented in the fossil record.Os achados de escamados (Reptilia, Squamata são escassos no Cretáceo do Brasil, incluindo cinco registros pontuais, dois do Aptiano-Albiano da Bacia do Araripe (Tijubina pontei Bonfim-Júnior e Marques e Olindalacerta brasiliensis Evans e Yabumoto, e três do Cretáceo Superior do Grupo Bauru (Pristiguana brasiliensis Estes and Price, Anilioidae gen. et sp. indet., Squamata gen. et sp. indet.. Nesta contribuição apresentamos um novo gênero e espécie de lagarto, Brasiliguana prudentis, baseado numa maxila esquerda com dentição. O material provém de depósitos da Formação Adamantina aflorantes próximos a cidade de Presidente Prudente, Estado de São Paulo, Brasil. O novo táxon é considerado um

  4. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  5. The Supply of Medical Radioisotopes. Final Report of the Third Mandate of the High-level Group on the Security of Supply of Medical Radioisotopes (2013-2015)

    International Nuclear Information System (INIS)

    Charlton, Kevin; )

    2016-07-01

    At the request of its member countries, the Organisation for Economic Co-operation and Development (OECD) Nuclear Energy Agency (NEA) became involved in global efforts to ensure a secure supply of molybdenum-99 ( 99 Mo)/technetium-99m ( 99m Tc). In April 2009, the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR) was created and received an initial, two-year mandate from the NEA Steering Committee for Nuclear Energy to examine the causes of supply shortages of 99 Mo/ 99m Tc and develop a policy approach to address them. In its first mandate, the HLG-MR conducted a comprehensive economic study of the 99 Mo/ 99m Tc supply chain, which identified the key areas of vulnerability and major issues to be addressed. The HLG-MR released a policy approach, including six principles (Appendix 1) and supporting recommendations to help resolve the issues in the 99 Mo/ 99m Tc market. In the second mandate (2011-2013), the HLG-MR worked to encourage the implementation of the six policy principles and promoted an industry transition away from the use of highly enriched uranium (HEU) targets for 99 Mo production. Projects were undertaken by the NEA that resulted in the publication of documents and reports to assist in implementing the HLG-MR policy approach. The second mandate showed that, while commendable progress had occurred in many areas, there were still major issues in the 99 Mo/ 99m Tc market, with some continued government subsidisation, insufficient ORC and inadequate reimbursement for 99 mTc. Potential future periods of supply shortage were identified, particularly concerning the likely loss of significant capacity around 2016. In the third mandate, the HLG-MR continued its efforts to help ensure the global security of supply of 99 Mo/ 99m Tc through implementation of the six policy principles. The NEA undertook a further self-assessment review of the 99 Mo/ 99m Tc supply chain, focusing again on progress with implementing FCR and paid ORC and

  6. Permian plants from the Chutani Formation (Titicaca Group, Northern Altiplano of Bolivia: I. Genera Pecopteris and Asterotheca

    Directory of Open Access Journals (Sweden)

    Carlos E. L. Vieira

    2004-03-01

    Full Text Available Fossil plants belonging to the morphogenera Glossopteris, Pecopteris and Asterotheca were collected from the upper part of the Chutani Formation (Titicaca Group, near the town of San Pablo de Tiquina, on the southeastern shore of Lake Titicaca (northern Altiplano, Bolivia. Here we report the analysis of fern-type foliage found at this location. Three species of pecopterid fronds are identified: Pecopteris dolianitii Rohn and Rösler, P. cf. P. cadeadensis Rohn and Rösler, and P. cf. P. pedrasica Read. All these species are typically found in Permian deposits of the Paraná Basin in southern Brazil. Despite the poor preservation of the material, a fertile specimen could be studied and was determined as Asterotheca sp. The paleoenvironmental and paleoecological implications of this new find are briefly analyzed.Plantas fósseis, pertencentes aos morfo-gêneros Glossopteris, Pecopteris e Asterotheca, foram coletadas na porção superior da seção aflorante da Formação Chutani, próxima ao povoado de San Pablo de Tiquina, sudeste do lago Titicaca (Altiplano norte, Bolívia. Este trabalho analisa folhagens do tipo feto encontradas neste sítio. Entre os espécimes estéreis, três espécies de frondes pecopterídeas foram identificadas: Pecopteris dolianiti, P. cf. cadeadensis e P. cf. pedrasica. Todas essas espécies eram até agora restritas aos depósitos permianos da Bacia do Paraná. A despeito do estado de preservação ruim do material, um espécime fértil pôde ser determinado como pertencente ao gênero Asterotheca. Implicações paleoambientais e paleoecológicas deste novo achado são brevemente analisadas.

  7. Barriers to Medication Decision Making in Women with Lupus Nephritis: A Formative Study using Nominal Group Technique.

    Science.gov (United States)

    Singh, Jasvinder A; Qu, Haiyan; Yazdany, Jinoos; Chatham, Winn; Dall'era, Maria; Shewchuk, Richard M

    2015-09-01

    To assess the perspectives of women with lupus nephritis on barriers to medication decision making. We used the nominal group technique (NGT), a structured process to elicit ideas from participants, for a formative assessment. Eight NGT meetings were conducted in English and moderated by an expert NGT researcher at 2 medical centers. Participants responded to the question: "What sorts of things make it hard for people to decide to take the medicines that doctors prescribe for treating their lupus kidney disease?" Patients nominated, discussed, and prioritized barriers to decisional processes involving medications for treating lupus nephritis. Fifty-one women with lupus nephritis with a mean age of 40.6 ± 13.3 years and disease duration of 11.8 ± 8.3 years participated in 8 NGT meetings: 26 African Americans (4 panels), 13 Hispanics (2 panels), and 12 whites (2 panels). Of the participants, 36.5% had obtained at least a college degree and 55.8% needed some help in reading health materials. Of the 248 responses generated (range 19-37 responses/panel), 100 responses (40%) were perceived by patients as having relatively greater importance than other barriers in their own decision-making processes. The most salient perceived barriers, as indicated by percent-weighted votes assigned, were known/anticipated side effects (15.6%), medication expense/ability to afford medications (8.2%), and the fear that the medication could cause other diseases (7.8%). Women with lupus nephritis identified specific barriers to decisions related to medications. Information relevant to known/anticipated medication side effects and medication cost will form the basis of a patient guide for women with systemic lupus erythematosus, currently under development.

  8. The Impact of Star Formation Histories on Stellar Mass Estimation: Implications from the Local Group Dwarf Galaxies

    Science.gov (United States)

    Zhang, Hong-Xin; Puzia, Thomas H.; Weisz, Daniel R.

    2017-11-01

    Building on the relatively accurate star formation histories (SFHs) and metallicity evolution of 40 Local Group (LG) dwarf galaxies derived from resolved color-magnitude diagram modeling, we carried out a comprehensive study of the influence of SFHs, metallicity evolution, and dust extinction on the UV-to-near-IR color-mass-to-light ratio (color-{log}{{{\\Upsilon }}}\\star (λ)) distributions and M ⋆ estimation of local universe galaxies. We find that (1) the LG galaxies follow color-{log}{{{\\Upsilon }}}\\star (λ) relations that fall in between the ones calibrated by previous studies; (2) optical color-{log}{{{\\Upsilon }}}\\star (λ) relations at higher [M/H] are generally broader and steeper; (3) the SFH “concentration” does not significantly affect the color-{log}{{{\\Upsilon }}}\\star (λ) relations; (4) light-weighted ages }λ and metallicities }λ together constrain {log}{{{\\Upsilon }}}\\star (λ) with uncertainties ranging from ≲0.1 dex for the near-IR up to 0.2 dex for the optical passbands; (5) metallicity evolution induces significant uncertainties to the optical but not near-IR {{{\\Upsilon }}}\\star (λ) at a given }λ and }λ ; (6) the V band is the ideal luminance passband for estimating {{{\\Upsilon }}}\\star (λ) from single colors, because the combinations of {{{\\Upsilon }}}\\star (V) and optical colors such as B - V and g - r exhibit the weakest systematic dependences on SFHs, metallicities, and dust extinction; and (7) without any prior assumption on SFHs, M ⋆ is constrained with biases ≲0.3 dex by the optical-to-near-IR SED fitting. Optical passbands alone constrain M ⋆ with biases ≲0.4 dex (or ≲0.6 dex) when dust extinction is fixed (or variable) in SED fitting. SED fitting with monometallic SFH models tends to underestimate M ⋆ of real galaxies. M ⋆ tends to be overestimated (or underestimated) at the youngest (or oldest) }{mass}.

  9. The program of group constants creation (SMOK) on basis libraries of evaluated nuclear data in ENDE/B format for physical module FORTUN-88

    International Nuclear Information System (INIS)

    Borisov, A.A.

    1991-01-01

    The SMOK program for creation of group microconstants in the FORTUN-88 physical module format providing for calculations of neutron transport by the Monte Carlo method is described. The program processes files of evaluated neutron nuclear data in the ENDF-4 format. The constant structure gives an apportunity to simulate the process of neutron collisions with matter in details. The program service capabilities provide for graphical constant comparison. 11 refs

  10. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  11. Formative Work to Develop a Tailored HIV Testing Smartphone App for Diverse, At-Risk, HIV-Negative Men Who Have Sex With Men: A Focus Group Study.

    Science.gov (United States)

    Mitchell, Jason W; Torres, Maria Beatriz; Joe, Jennifer; Danh, Thu; Gass, Bobbi; Horvath, Keith J

    2016-11-16

    Although gay, bisexual, and other men who have sex with men (MSM) are disproportionately affected by human immunodeficiency virus (HIV) infection, few test for HIV at regular intervals. Smartphone apps may be an ideal tool to increase regular testing among MSM. However, the success of apps to encourage regular testing among MSM will depend on how frequently the apps are downloaded, whether they continue to be used over months or years, and the degree to which such apps are tailored to the needs of this population. The primary objectives of this study were to answer the following questions. (1) What features and functions of smartphone apps do MSM believe are associated with downloading apps to their mobile phones? (2) What features and functions of smartphone apps are most likely to influence MSM's sustained use of apps over time? (3) What features and functions do MSM prefer in an HIV testing smartphone app? We conducted focus groups (n=7, with a total of 34 participants) with a racially and ethnically diverse group of sexually active HIV-negative MSM (mean age 32 years; 11/34 men, 33%, tested for HIV ≥10 months ago) in the United States in Miami, Florida and Minneapolis, Minnesota. Focus groups were digitally recorded, transcribed verbatim, and deidentified for analysis. We used a constant comparison method (ie, grounded theory coding) to examine and reexamine the themes that emerged from the focus groups. Men reported cost, security, and efficiency as their primary reasons influencing whether they download an app. Usefulness and perceived necessity, as well as peer and posted reviews, affected whether they downloaded and used the app over time. Factors that influenced whether they keep and continue to use an app over time included reliability, ease of use, and frequency of updates. Poor performance and functionality and lack of use were the primary reasons why men would delete an app from their phone. Participants also shared their preferences for an app to

  12. National Reachback Systems for Nuclear Security: State-of-play report: ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure: Deliverable of task 3.1b

    OpenAIRE

    TOIVONEN H.; HUBERT Schoech; REPPENHAGEN GRIM P.; PIBIDA Leticia; JAMES Mark; ZHANG Weihua; PERÄJÄRVI K.

    2015-01-01

    Operational systems for nuclear security in Finland, France, Denmark, UK, US and Canada were reviewed. The Finnish case is a holistic approach to Nuclear Security Detection Architecture, as defined by the International Atomic Energy Agency; reachback is only one component of the system, albeit an important crosscutting element of the detection architecture. The French and US studies concentrate on the reachback itself. The Danish nuclear security system is information-driven, relying on th...

  13. ENDF-6 formats manual. Version of June 1997. Written by the members of the US cross section evaluation working group

    International Nuclear Information System (INIS)

    McLane, V.; Dunford, C.L.; Rose, P.F.

    1997-01-01

    ENDF-6 is the international computer file format for evaluated nuclear data. This document gives a detailed description of the formats and procedures adopted for ENDF-6. It consists of the report BNL-NCS-44945 (Rev. 2/97) (=ENDF-201, Rev. 2/97) with an Interim Revision of June 1997 and a few front pages added by the IAEA Nuclear Data Section. (author)

  14. Group additivity values for enthalpies of formation (298 K), entropies (298 K), and molar heat capacities (300 K < T < 1500 K) of gaseous fluorocarbons

    International Nuclear Information System (INIS)

    Van Otterloo, Maren K.; Girshick, Steven L.; Roberts, Jeffrey T.

    2007-01-01

    A group additivity method was developed to estimate standard enthalpies of formation and standard entropies at 298 K of linear radical and closed-shell, gaseous fluorocarbon neutrals containing four or more carbon atoms. The method can also be used to estimate constant pressure molar heat capacities of the same compounds over the temperature range 300 K to 1500 K. Seventeen groups and seven fluorine-fluorine interaction terms were defined from 12 fluorocarbon molecules. Interaction term values from Yamada and Bozzelli [T. Yamada, J.W. Bozzelli, J. Phys. Chem. A 103 (1999) 7373-7379] were utilized. The enthalpy of formation group values were derived from G3MP2 calculations by Bauschlicher and Ricca [C.W. Bauschlicher, A. Ricca, J. Phys. Chem. A 104 (2000) 4581-4585]. Standard entropy and molar heat capacity group values were estimated from ab initio geometry optimization and frequency calculations at the Hartree-Fock level using the 6-31G(d) basis set. Enthalpies of formation for larger fluorocarbons estimated from the group additivity method compare well to enthalpies of formation found in the literature

  15. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  16. Testing Timescales for Rhythms Recorded in the 2.5 Ga Banded Iron Formation of the Dales Gorge Member (Brockman Iron Formation, Hamersley Group, Australia)

    Science.gov (United States)

    Hinnov, L. A.; de Oliveira Carvalho Rodrigues, P.; Franco, D.

    2017-12-01

    The classic, Superior-type banded iron formation (BIF) of the Precambrian Dales Gorge Member (DGM) of the Brockman Iron Formation, Hamersley Basin, Western Australia consists of a succession of micro- (millimeter-scale) and meso- (centimeter to decimeter-scale) bands of primarily iron-silica chemical sediment alternations, separated into macro- (meter to decameter-scale) bands by shales (1). Here, we present a time-frequency analysis of a gray-scale scan of the DGM "type section core" Hole 47A with small contributions from Hole EC10 (1) to provide a comprehensive characterization of banding patterns and periodicity throughout the 140 m section. SHRIMP zircon ages (2) indicate that the DGM was deposited over approximately 30 myr during the Archean-Proterozoic transition just prior to the Great Oxidation Event. This suggests that the banding patterns recorded Milankovitch cycles, although with orbital-rotational parameters significantly different from present-day due to Earth's tidal dissipation and chaotic episodes in the Solar System since 2.5 Ga. Banding patterns change systematically within the formation in response to slowly varying environmental conditions, which have been interpreted previously to be related to sea level change and basin evolution (3). Researchers, including (2), have questioned the 30 myr duration, suggesting instead that the micro-bands may be annual in scale. This would indicate a much shorter duration of less than 150 kyr for the DGM. In an attempt to determine whether Milankovitch cycles could have generated the meso-band patterns, we present detailed studies of BIF0 and BIF12, which typify the marked changes in meso-banding along the section. Objective procedures are also applied, including ASM (4) and TIMEOPT (5) to test for a range of potential alternative timescales assuming orbital-rotational parameter values modeled for 2.5 Ga. References: (1) Trendall, A.K., Blockley, J.G., GSWA Ann. Rep. 1967, 48, 1968; (2) Trendall, A.K., et al

  17. Unusual C-C bond cleavage in the formation of amine-bis(phenoxy) group 4 benzyl complexes: Mechanism of formation and application to stereospecific polymerization

    KAUST Repository

    Gowda, Ravikumar R.; Caporaso, Lucia; Cavallo, Luigi; Chen, Eugene You Xian

    2014-01-01

    Group 4 tetrabenzyl compounds MBn4 (M = Zr, Ti), upon protonolysis with an equimolar amount of the tetradentate amine-tris(phenol) ligand N[(2,4-tBu2C6H2(CH 2)OH]3 in toluene from -30 to 25 °C, unexpectedly lead to amine-bis(phenoxy) dibenzyl

  18. Ab initio computational study of –N-C and –O-C bonding formation : functional group modification reaction based chitosan

    Science.gov (United States)

    Siahaan, P.; Salimah, S. N. M.; Sipangkar, M. J.; Hudiyanti, D.; Djunaidi, M. C.; Laksitorini, M. D.

    2018-04-01

    Chitosan application in pharmaceutics and cosmeceutics industries is limited by its solubility issue. Modification of -NH2 and -OH fuctional groups of chitosan by adding carboxyl group has been shown to improve its solubility and application. Attempt to synthesize carboxymethyl chitosan (CMC) from monocloroacetic acid (MCAA) has been done prior this report. However no information is available wether –OH (-O-C bonding formation) or -NH2 (-N-C bonding formation) is the preference for - CH2COOH to attach. In the current study, the reaction mechanism between chitosan and MCAA reactants into carboxymethyl chitosan (CMC) was examined by computational approach. Dimer from of chitosan used as a molecular model in calculation All the molecular structure involved in the reaction mechanism was optimized by ab initio computational on the theory and basis set HF/6-31G(d,p). The results showed that the - N-C bonding formation via SN2 than the -O-C bonding formation via SN2 which have activation energy 469.437 kJ/mol and 533.219 kJ/mol respectively. However, the -O-C bonding formation more spontaneous than the -N-C bonding formation because ΔG the formation of O-CMC-2 reaction is more negative than ΔG of formation N-CMC-2 reaction is -4.353 kJ/mol and -1.095 kJ/mol respectively. The synthesis of N,O-CMC first forms -O-CH2COOH, then continues to form -NH-CH2COOH. This information is valuable to further optimize the reaction codition for CMC synthesis.

  19. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  20. Collaborative group and teacher formation: (transformation dialogues with a fledging university professor - doi: 10.4025/actascieduc.v35i2.20307

    Directory of Open Access Journals (Sweden)

    Maria Aparecida de Souza Perrelli

    2013-07-01

    Full Text Available Discussions on university teaching, teaching initiation and the necessary teacher support during the initial phase of their career are provided. The above mentioned discussions foregrounded a study by a research-formation collaborative Group. Sharing participants in the Group were involved in reflections on their professional practice to (transform themselves in the process. The text focused on a Group member, a fledging female professional in university teaching, and the support provided by co-trainers during this difficult phase in her career. Support comprised the provision of conditions for dialogues with the teacher, prompting her to understand the reasons that underlay their practice. Different strategies were used, esp the ‘formation letters’. The above contributed towards the production of an autobiographical narrative in which the professor reflected on her formation process as a professor. The reflective narratives on the teacher’s life, produced within the Group’s mediation and shared with its members, constituted important formation themes not merely for the teacher but also for those who interacted with her in the collaborative Group.

  1. Diols and anions can control the formation of an exciplex between a pyridinium boronic acid with an aryl group connected via a propylene linker.

    Science.gov (United States)

    Huang, Yan-Jun; Jiang, Yun-Bao; Bull, Steven D; Fossey, John S; James, Tony D

    2010-11-21

    The exciplex formation between a pyridinium boronic acid and phenyl group connected via a propylene linker can be monitored using fluorescence. Addition of pinacol affords a cyclic boronate ester with enhanced Lewis acidity that increases the strength of its cation-π stacking interaction causing a four-fold fluorescence enhancement.

  2. Qu'en est-il de la transmission dans les groupes d'analyse de pratiques en formation ?

    OpenAIRE

    Vallet, Patricia

    2012-01-01

    Atelier 21 : Travail social et bénévolat; Ma recherche s'intéresse à la formation des professionnels de la relation, et à cette instance particulière qu'est l'analyse des pratiques : celle-ci suppose la transmission d'une capacité de problématisation des situations professionnelles, un regard critique ajusté, un certain rapport aux savoirs, une attitude herméneutique, et une posture particulière de l'animateur pour favoriser le cheminement des personnes en formation. Car au-delà d'une meilleu...

  3. Formative Assessment: Using Concept Cartoon, Pupils' Drawings, and Group Discussions to Tackle Children's Ideas about Biological Inheritance

    Science.gov (United States)

    Chin, Christine; Teou, Lay-Yen

    2010-01-01

    This study was carried out in the context of formative assessment where assessment and learning were integrated to enhance both teaching and learning. The purpose of the study was to: (a) identify pupils' ideas about biological inheritance through the use of a concept cartoon, pupils' drawings and talk, and (b) devise scaffolding structures that…

  4. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  5. The Younger Age Limit of Metasedimentary Protolith Formation of the Lower Part of the Udokan Group Rocks (Aldan Shield)

    Science.gov (United States)

    Kotov, A. B.; Salnikova, E. B.; Kovach, V. P.; Velikoslavinskii, S. D.; Sklyarov, E. V.; Gladkochub, D. P.; Larin, A. M.; Tolmacheva, E. V.; Fedoseenko, A. M.; Plotkina, Yu. V.

    2018-04-01

    Biotite plagiogranite intruding sediments of the Kodar Sub-Group of the Udokan Group that have both undergone amphibolite grade alterations has been dated by the U-Pb ID TIMS technique using zircon to 2105 ± 6 Ma. This age estimate to a first approximation corresponds to the younger age limit of deposition of the siliciclastics in the lower section of the Udokan Group.

  6. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  7. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  8. Dynamics of the accumulation process of the Earth group of planets: Formation of the reverse rotation of Venus

    Science.gov (United States)

    Koslov, N. N.; Eneyev, T. M.

    1979-01-01

    A numerical simulation of the process of formation of the terrestrial planets is carried within the framework of a new theory for the accumulation of planetary and satellite systems. The numerical simulation permitted determining the parameters of the protoplanetary disk from which Mercury, Venus and the Earth were formed as result of the evolution. The acquisition of a slow retrograde rotation for Venus was discovered during the course of the investigation, whereas Mercury and the Earth acquired direct rotation about their axes. Deviations of the semimajor axes of these three planets as well as the masses of the Earth and Venus from the true values are small as a rule (l 10%). It is shown that during the accumulation of the terrestrial planets, there existed a profound relationship between the process of formation of the orbits and masses of the planet and the process of formation of their rotation about their axes. Estimates are presented for the radii of the initial effective bodies and the time of evolution for the terrestrial accumulation zone.

  9. Exploring the Relevance of Single-Gender Group Formation: What We Learn from a Massive Open Online Course (MOOC)

    Science.gov (United States)

    Bayeck, Rebecca Yvonne; Hristova, Adelina; Jablokow, Kathryn W.; Bonafini, Fernanda

    2018-01-01

    This paper reports the results of an exploratory study on participants' perception of the importance of single-gender grouping in a massive open online course (MOOC) delivered through the Coursera platform. Findings reveal that female and male learners' perception of single-gender grouping differs. Female students more than males indicated less…

  10. Integrating the ACR Appropriateness Criteria Into the Radiology Clerkship: Comparison of Didactic Format and Group-Based Learning.

    Science.gov (United States)

    Stein, Marjorie W; Frank, Susan J; Roberts, Jeffrey H; Finkelstein, Malka; Heo, Moonseong

    2016-05-01

    The aim of this study was to determine whether group-based or didactic teaching is more effective to teach ACR Appropriateness Criteria to medical students. An identical pretest, posttest, and delayed multiple-choice test was used to evaluate the efficacy of the two teaching methods. Descriptive statistics comparing test scores were obtained. On the posttest, the didactic group gained 12.5 points (P didactic group gained 14.4 points (P didactic lectures, group-based learning is more enjoyable, time efficient, and equally efficacious. The choice of educational method can be individualized for each institution on the basis of group size, time constraints, and faculty availability. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. ANALYSIS OF THE IMPACT OF THE OPERATIONAL FORMATION TWO GROUP TRAINS ON THE INDIVIDUAL PERFORMANCE OF THE WORK

    Directory of Open Access Journals (Sweden)

    M. P. Bozhko

    2010-02-01

    Full Text Available The research of operative management by the organization of wagon flows in trains on a railway direction is executed. It is proved the expediency of introduction of a rational combination of formation of single-unit trains and two-unit trains with the purpose of acceleration of delivery of cargoes. The duration of planning period is offered as a condition for decision-making on determination of category of a separate train. The economic effect of introduction of operative management is obtained.

  12. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    field of PP and most of them have been revised at least once. They have been produced by the French Operators, assessed by the IPSN and approved by the French Competent Authority. They are mandatory as far as PP is concerned for NM held in category I facilities. To go ahead preliminary security studies in the field of MC and A have been performed by operators of two different types of facilities, the results of which are very encouraging. In the field of PP, security studies are based on an analysis consisting in grouping together all the possible paths leading to NM in compliance with a set of threats. Diagrams could be used to show which actions have to be taken to successfully carry out the theft of NM. This may involve crossing zones or outwitting detection devices and overcoming obstacles. By following the diagrams mentioned above, the probability of undetected persons or nuclear materials as they progress in the facility is evaluated. The relevant criteria to assume that the theft has been detected is determined. Then the time elapsing between positive detection of the action and the removal of the NM from the facility is estimated. This estimate is based on documented data and/or the results of tests carried out in the facility or elsewhere. Critical paths are taken as being those along which nuclear materials can be removed from the facility in the shortest time after detection. Special care is taken when analyzing these paths. In the field of MC and A, when unauthorized removal or dysfunction occurs, a discrepancy appears between the physical reality of NM and the way in which it is represented in the MC and A systems. In the case of these studies, an assumption is made that such a discrepancy exists in compliance with a set of threats. Then, the purpose of the security study is to analyse the way in which the discrepancy is revealed in connection with a discovery threshold amount, if any. It should be noted that possible detection of the discrepancy by the

  13. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Biogeochemical and micropaleontological study of black chert, Sete Lagoas Formation, Bambui Group (Late Proterozoic), Sao Gabriel (GO), Brazil

    International Nuclear Information System (INIS)

    Subacius, S.M.R.

    1985-01-01

    The biogeochemical study of amorphous and structured organic matter (OM) in two samples of thinly laminated black cherts (SG-1 and SG-2) from Sete Lagoas Formation, State of Goias, Brazil, is presented. The spectra analysis of infra-red, electron paramagnetic resonance and isotope ratio of C-12 and C-13 shown that: the amorphous OM consists of a soluble fraction (SF) and a insoluble fraction (Kerogen), which only the latter is syngenetic; the allochthonous SF comes from several sources, mainly from Phanerozoic sediments and soil contamination; the SG-1 and SG-2 Kerogens have δ 13 C values (-27.2 per mille and - 29.2 per mille respectively), which suggest OM photosynthetized and submitted to a mild thermal hystory; although the preserved microbiota is dominated by allochthonous elements (colonial fragments) and planktonic forms, both Kerogens were derived for the most part from photo-autotrophic benthonic communities, probably responsible for the lamination in the original carbonate rock, both SG-1 and SG-2 Kerogens exhibits O/C and H/C ratios comparable to Proterozoic humic Kerogens (type IV); the preserved microflora represents a microbial community of the chert-algae facies typical of the Middle and upper Proterozoic; and the occurence of rare acritarchs (Kildinella spp.) in the microflora is biostratigraphically significant in that it suggests a Late Riphean or Vendian age (950-570 m.y.) for the Sete Lagoas Formation. (Author) [pt

  17. Professional identity formation in the transition from medical school to working life: a qualitative study of group-coaching courses for junior doctors.

    Science.gov (United States)

    de Lasson, Lydia; Just, Eva; Stegeager, Nikolaj; Malling, Bente

    2016-06-24

    The transition from student to medical doctor is challenging and stressful to many junior doctors. To practice with confidence and professionalism the junior doctors have to develop a strong professional identity. Various suggestions on how to facilitate formation of professional identity have been offered including the possible positive effect of group-coaching courses. The purpose of this study was to explore how group-coaching might facilitate professional identity formation among junior doctors in the transition period. Group-coaching courses comprising three whole-day sessions and five 2 h sessions during a period of 4 months were offered to junior doctors in the first years after graduation. The purpose was to support the participants' professional development, ability to relate to patients, relatives and staff and career development. The coaches in this study had a background as health professionals combined with coaching educations. Data was obtained through observations, open-ended questionnaires and interviews. A generic thematic analysis was applied. Forty-five doctors participated in six coaching groups. The three main themes emerging in the sessions were: Adoption to medical culture, career planning, and work/life-balance. The junior doctors found the coaching intervention highly useful in order to cope with these challenges. Furthermore, the group was a forum where the junior doctors could share thoughts and feelings with colleagues without being afraid that this would endanger their professional career. Many found new ways to respond to everyday challenges mainly through a new awareness of patterns of thinking and feeling. The participants found that the group-coaching course supported their professional identity formation (thinking, feeling and acting as a doctor), adoption to medical culture, career planning and managing a healthy work/life-balance. Further studies in different contexts are recommended as well as studies using other methods to

  18. Four groups of new aromatic halogenated disinfection byproducts: effect of bromide concentration on their formation and speciation in chlorinated drinking water.

    Science.gov (United States)

    Pan, Yang; Zhang, Xiangru

    2013-02-05

    Bromide is naturally present in source waters worldwide. Chlorination of drinking water can generate a variety of chlorinated and brominated disinfection byproducts (DBPs). Although substantial efforts have been made to examine the effect of bromide concentration on the formation and speciation of halogenated DBPs, almost all previous studies have focused on trihalomethanes and haloacetic acids. Given that about 50% of total organic halogen formed in chlorination remains unknown, it is still unclear how bromide concentration affects the formation and speciation of the new/unknown halogenated DBPs. In this study, chlorinated drinking water samples with different bromide concentrations were prepared, and a novel approach-precursor ion scan using ultra performance liquid chromatography/electrospray ionization-triple quadrupole mass spectrometry-was adopted for the detection and identification of polar halogenated DBPs in these water samples. With this approach, 11 new putative aromatic halogenated DBPs were identified, and they were classified into four groups: dihalo-4-hydroxybenzaldehydes, dihalo-4-hydroxybenzoic acids, dihalo-salicylic acids, and trihalo-phenols. A mechanism for the formation of the four groups of new aromatic halogenated DBPs was proposed. It was found that increasing the bromide concentration shifted the entire polar halogenated DBPs as well as the four groups of new DBPs from being less brominated to being more brominated; these new aromatic halogenated DBPs might be important intermediate DBPs formed in drinking water chlorination. Moreover, the speciation of the four groups of new DBPs was modeled: the speciation patterns of the four groups of new DBPs well matched those determined from the model equations, and the reactivity differences between HOBr and HOCl in reactions forming the four groups of new DBPs were larger than those in reactions forming trihalomethanes and haloacetic acids.

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. The Interface Between Safety and Security at Nuclear Power Plants. INSAG-24. A report by the International Nuclear Safety Group (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    This publication seeks to provide a better understanding of the interface between safety and security at nuclear power plants and to discuss the means to achieve both objectives in an optimal fashion. It provides information in a background chapter on the existing relevant documentation, discusses the expectations for administrative arrangements at different levels, surveys certain common principles, and suggests general solutions that can help ensure an integrated approach. Conclusions are drawn and high level recommendations are proposed with the goal of maximizing the protection of the public, property, society and the environment through an improved and strengthened interface between safety and security

  1. Use of Flood Seasonality in Pooling-Group Formation and Quantile Estimation: An Application in Great Britain

    Science.gov (United States)

    Formetta, Giuseppe; Bell, Victoria; Stewart, Elizabeth

    2018-02-01

    Regional flood frequency analysis is one of the most commonly applied methods for estimating extreme flood events at ungauged sites or locations with short measurement records. It is based on: (i) the definition of a homogeneous group (pooling-group) of catchments, and on (ii) the use of the pooling-group data to estimate flood quantiles. Although many methods to define a pooling-group (pooling schemes, PS) are based on catchment physiographic similarity measures, in the last decade methods based on flood seasonality similarity have been contemplated. In this paper, two seasonality-based PS are proposed and tested both in terms of the homogeneity of the pooling-groups they generate and in terms of the accuracy in estimating extreme flood events. The method has been applied in 420 catchments in Great Britain (considered as both gauged and ungauged) and compared against the current Flood Estimation Handbook (FEH) PS. Results for gauged sites show that, compared to the current PS, the seasonality-based PS performs better both in terms of homogeneity of the pooling-group and in terms of the accuracy of flood quantile estimates. For ungauged locations, a national-scale hydrological model has been used for the first time to quantify flood seasonality. Results show that in 75% of the tested locations the seasonality-based PS provides an improvement in the accuracy of the flood quantile estimates. The remaining 25% were located in highly urbanized, groundwater-dependent catchments. The promising results support the aspiration that large-scale hydrological models complement traditional methods for estimating design floods.

  2. The elusive concept of 'internal objects' (1934-1943). Its role in the formation of the Klein Group.

    Science.gov (United States)

    Hinshelwood, R D

    1997-10-01

    The author traces a debate about the concept of 'internal objects' that took place between 1937 and 1943 at a time when a group of British analysts was forming around Melanie Klein. The debate is set within a complex of personal, group and organisational dynamics, which the paper makes a start on unravelling. The history of the British Psycho-Analytical Society at this time exemplifies Bion's notion of group schism. The events in the Society's history demonstrate defensive aspects of the interaction between the opposed groups, which support members against various anxieties. These include the stress of the work of analysis, but also in this instance the particular anxieties deriving from the collapse of psychoanalysis in Europe, the state of war of the country as a whole, and the death of Freud shortly after he came to London. This psychoanalytic anxiety/defence model clarifies some aspects of the debate about internal objects, and demonstrates the way in which these various anxieties and defences become organised around a scientific debate in a scientific society.

  3. Strong far-infrared cooling lines, peculiar CO kinematics, and possible star-formation suppression in Hickson compact group 57

    DEFF Research Database (Denmark)

    Alatalo, K.; Appleton, P. N.; Lisenfeld, U.

    2014-01-01

    We present [C II] and [O I] observations from Herschel and CO(1-0) maps from the Combined Array for Research in Millimeter Astronomy (CARMA) of the Hickson compact group HCG 57, focusing on the galaxies HCG 57a and HCG 57d. HCG 57a has been previously shown to contain enhanced quantities of warm ...

  4. Formation of hydroxyl groups and exchange with deuterium on NaHX and NaHY zeolites

    International Nuclear Information System (INIS)

    Kubelkova, L.; Novakova, J.

    1976-01-01

    Deammoniation and dehydroxylation of Na(NH 4 )X and Na(NH 4 )Y zeolites were compared. With the X type, both processes overlapped and proceeded more easily than with the Y type. Both H forms contained structural OH groups and hydroxyls denoted as SiOH, to which the 3740 cm -1 band in the IR spectrum was assigned. In addition, the NaHX zeolite contained OH groups characterized by the 3700 and 3600 cm -1 bands. Certain differences in the behaviour of NaHX and NaHY zeolites during deammoniation and dehydroxylation might be attributed to the presence of ''non-localizable'' H atoms. The active sites for the D 2 -OH exchange were probably formed during dehydroxylation. Hydrogen in SiOH groups was replaced by deuterium in both zeolite types more slowly than H atoms in other OH groups, which influenced the kinetic variations in the gaseous phase. The presence of water in the gaseous phase affected the kinetics and could distort the determination of the number of H atoms bound in the zeolites. (author)

  5. Fission-track ages of the Tokai Group and associate formations in the east coast areas of Ise Bay and their significance in geohistory

    International Nuclear Information System (INIS)

    Makinouchi, Takeshi; Danhara, Toru; Isoda, Kunitoshi.

    1983-01-01

    Fission-track ages of volcanic ash layers within the Tokai Group and associate formations in the east coast areas of Ise Bay are obtained by grain-by-grain method with which individual ages for the respective zircon grains are measured. They are as follows; 1) a volcanic ash layer in the Karayama Formation (tentative age: 1.9 +- 0.4 Ma). Among the zircon grains in this layer, essential ones occupy only 1 per cent, and the others are accidental. 2) Ohtani volcanic ash layer (4.3 +- 0.6 Ma). 3) Kosugaya volcanic ash layer (4.0 +- 0.5 Ma). 4) Kaminoma volcanic ash layer (5.3 +- 0.4 Ma). 5) A volcanic ash layer in the Toyoura Formation seems to be older than 10 Ma. 6) Zircon grains in the Kofu volcanic ash layer (Tokai Group) include two types of spontaneous namely track, clear and vague ones. The latter vague tracks are shorter and thiner, and seem to suffer thermal annealing. The ages obtained have clarified the following Points; a) The tentative age, 1.9 Ma, of the ''Karayama'' volcanic ash layer suggests the existence of unknown Plio-Pleistocene sediment in the Nagoya area. b) The sedimentary basin of Lake Tokai was formed in the latest Miocene, about 6.5 Ma. Generation of the basin coincides approximately with the stage of synchronous and abrupt change in sedimentation rate in sedimentary basins on the Pacific side of central and southern Japan. c) The Tokai Group in Chita (Tokoname Group) intercalates the Gilbert/Epoch 5 boundary in the paleomagnetic chronology in the middle horizon of the group. d) Average rate of sedimentation is about 1 m/10 4 yrs in the marginal areas of the basin, and 3-5 m/10 4 yrs in the central areas. (author)

  6. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  7. Some Like it Hot: Linking Diffuse X-Ray Luminosity, Baryonic Mass, and Star Formation Rate in Compact Groups of Galaxies

    Science.gov (United States)

    Desjardins, Tyler D.; Gallagher, Sarah C.; Hornschemeier, Ann E.; Mulchaey, John S.; Walker, Lisa May; Brandt, Willian N.; Charlton, Jane C.; Johnson, Kelsey E.; Tzanavaris, Panayiotis

    2014-01-01

    We present an analysis of the diffuse X-ray emission in 19 compact groups (CGs) of galaxies observed with Chandra. The hottest, most X-ray luminous CGs agree well with the galaxy cluster X-ray scaling relations in L(x-T) and (L(x-sigma), even in CGs where the hot gas is associated with only the brightest galaxy. Using Spitzer photometry, we compute stellar masses and classify Hickson CGs 19, 22, 40, and 42, and RSCGs 32, 44, and 86 as fossil groups using a new definition for fossil systems that includes a broader range of masses. We find that CGs with total stellar and Hi masses are great than or equal to 10(sup (11.3) solar mass are often X-ray luminous, while lower-mass CGs only sometimes exhibit faint, localized X-ray emission. Additionally, we compare the diffuse X-ray luminosity against both the total UV and 24 micron star formation rates of each CG and optical colors of the most massive galaxy in each of the CGs. The most X-ray luminous CGs have the lowest star formation rates, likely because there is no cold gas available for star formation, either because the majority of the baryons in these CGs are in stars or the X-ray halo, or due togas stripping from the galaxies in CGs with hot halos. Finally, the optical colors that trace recent star formation histories of the most massive group galaxies do not correlate with the X-ray luminosities of the CGs, indicating that perhaps the current state of the X-ray halos is independent of the recent history of stellar mass assembly in the most massive galaxies.

  8. Rapid detection of rRNA group I pseudomonads in contaminated metalworking fluids and biofilm formation by fluorescent in situ hybridization.

    Science.gov (United States)

    Saha, Ratul; Donofrio, Robert S; Goeres, Darla M; Bagley, Susan T

    2012-05-01

    Metalworking fluids (MWFs), used in different machining operations, are highly prone to microbial degradation. Microbial communities present in MWFs lead to biofilm formation in the MWF systems, which act as a continuous source of contamination. Species of rRNA group I Pseudomonas dominate in contaminated MWFs. However, their actual distribution is typically underestimated when using standard culturing techniques as most fail to grow on the commonly used Pseudomonas Isolation Agar. To overcome this, fluorescent in situ hybridization (FISH) was used to study their abundance along with biofilm formation by two species recovered from MWFs, Pseudomonas fluorescens MWF-1 and the newly described Pseudomonas oleovorans subsp. lubricantis. Based on 16S rRNA sequences, a unique fluorescent molecular probe (Pseudo120) was designed targeting a conserved signature sequence common to all rRNA group I Pseudomonas. The specificity of the probe was evaluated using hybridization experiments with whole cells of different Pseudomonas species. The probe's sensitivity was determined to be 10(3) cells/ml. It successfully detected and enumerated the abundance and distribution of Pseudomonas indicating levels between 3.2 (± 1.1) × 10(6) and 5.0 (± 2.3) × 10(6) cells/ml in four different industrial MWF samples collected from three different locations. Biofilm formation was visualized under stagnant conditions using high and low concentrations of cells for both P. fluorescens MWF-1 and P. oleovorans subsp. lubricantis stained with methylene blue and Pseudo120. On the basis of these observations, this molecular probe can be successfully be used in the management of MWF systems to monitor the levels and biofilm formation of rRNA group I pseudomonads.

  9. Child and Family-Focused Cognitive-Behavioral Therapy for Pediatric Bipolar Disorder: Pilot Study of Group Treatment Format

    Science.gov (United States)

    West, Amy E.; Jacobs, Rachel H.; Westerholm, Robert; Lee, Adabel; Carbray, Julie; Heidenreich, Jodi; Pavuluri, Mani N.

    2009-01-01

    Introduction: This study is a preliminary report of a group adaptation of child- and family-focused cognitive behavior therapy (CFF-CBT) for pediatric bipolar disorder (PBD). Methods: CFF-CBT group treatment was provided to twenty six families who had children with a diagnosis of PBD ranging between six- and twelve-years-old. Results: Results indicated that CFF-CBT was feasible and acceptable to families. CFF-CBT resulted in significant improvement in manic, but not depressive, symptoms and in children’s psychosocial functioning post-treatment. In addition, although not statistically significant, parents reported an increased ability to cope with their child’s illness. Results of this study suggest that group psychosocial treatment provided alongside pharmacotherapy may help attain remission of symptoms, as well as increase overall psychosocial coping and well-being in both children and parents. Conclusion: Future work must include a more rigorous test of CFF-CBT in a randomized controlled trial. PMID:19718425

  10. Views of parents, teachers and children on health promotion in kindergarten--first results from formative focus groups and observations.

    Science.gov (United States)

    Sansolios, Sanne; Mikkelsen, Bent Egberg

    2011-10-01

    The aim of the study was to capture the views of children, parents and teachers on the topic of physical activity in kindergarten through observation and focus group interviews. The study was conducted in the kindergartens from the sampling group in the Danish part of PERISCOPE. 1(st) methodology: Children interviewed inside by the researcher on preferable movements and settings and then observed outside during their playtime. 2(nd) methodology: Children asked to draw themselves playing their most preferred physical activity. Parents and kindergarten teachers interviewed in two different groups, using an identical guide. Children are skilled in taking advantage of the space and facilities available for physical activity; girls need more support than boys to initiate physical activity; children are happy with the facilities and the toys available in the kindergarten. Teachers feel an increasing pressure to take more responsibility and initiatives for the children's health habits. Parents state that if more physical activity is initiated in the kindergarten, it could make children request domestic activity. Physical activity and movement concept are too abstract for children of this age to talk about: they quickly lose their focus and concentration. The new methodology of videotaping gives the researcher the chance to interpret facial expressions to capture movement, talk and actions, and to make a distinction among children, as they tend to interrupt each other. However, this method contains a weakness, if used alone, by the fact that the shooting is only a reflection of what the video camera has recorded.

  11. Population genomic analysis of strain variation in Leptospirillum group II bacteria involved in acid mine drainage formation.

    Science.gov (United States)

    Simmons, Sheri L; Dibartolo, Genevieve; Denef, Vincent J; Goltsman, Daniela S Aliaga; Thelen, Michael P; Banfield, Jillian F

    2008-07-22

    Deeply sampled community genomic (metagenomic) datasets enable comprehensive analysis of heterogeneity in natural microbial populations. In this study, we used sequence data obtained from the dominant member of a low-diversity natural chemoautotrophic microbial community to determine how coexisting closely related individuals differ from each other in terms of gene sequence and gene content, and to uncover evidence of evolutionary processes that occur over short timescales. DNA sequence obtained from an acid mine drainage biofilm was reconstructed, taking into account the effects of strain variation, to generate a nearly complete genome tiling path for a Leptospirillum group II species closely related to L. ferriphilum (sampling depth approximately 20x). The population is dominated by one sequence type, yet we detected evidence for relatively abundant variants (>99.5% sequence identity to the dominant type) at multiple loci, and a few rare variants. Blocks of other Leptospirillum group II types ( approximately 94% sequence identity) have recombined into one or more variants. Variant blocks of both types are more numerous near the origin of replication. Heterogeneity in genetic potential within the population arises from localized variation in gene content, typically focused in integrated plasmid/phage-like regions. Some laterally transferred gene blocks encode physiologically important genes, including quorum-sensing genes of the LuxIR system. Overall, results suggest inter- and intrapopulation genetic exchange involving distinct parental genome types and implicate gain and loss of phage and plasmid genes in recent evolution of this Leptospirillum group II population. Population genetic analyses of single nucleotide polymorphisms indicate variation between closely related strains is not maintained by positive selection, suggesting that these regions do not represent adaptive differences between strains. Thus, the most likely explanation for the observed patterns of

  12. Population genomic analysis of strain variation in Leptospirillum group II bacteria involved in acid mine drainage formation.

    Directory of Open Access Journals (Sweden)

    Sheri L Simmons

    2008-07-01

    Full Text Available Deeply sampled community genomic (metagenomic datasets enable comprehensive analysis of heterogeneity in natural microbial populations. In this study, we used sequence data obtained from the dominant member of a low-diversity natural chemoautotrophic microbial community to determine how coexisting closely related individuals differ from each other in terms of gene sequence and gene content, and to uncover evidence of evolutionary processes that occur over short timescales. DNA sequence obtained from an acid mine drainage biofilm was reconstructed, taking into account the effects of strain variation, to generate a nearly complete genome tiling path for a Leptospirillum group II species closely related to L. ferriphilum (sampling depth approximately 20x. The population is dominated by one sequence type, yet we detected evidence for relatively abundant variants (>99.5% sequence identity to the dominant type at multiple loci, and a few rare variants. Blocks of other Leptospirillum group II types ( approximately 94% sequence identity have recombined into one or more variants. Variant blocks of both types are more numerous near the origin of replication. Heterogeneity in genetic potential within the population arises from localized variation in gene content, typically focused in integrated plasmid/phage-like regions. Some laterally transferred gene blocks encode physiologically important genes, including quorum-sensing genes of the LuxIR system. Overall, results suggest inter- and intrapopulation genetic exchange involving distinct parental genome types and implicate gain and loss of phage and plasmid genes in recent evolution of this Leptospirillum group II population. Population genetic analyses of single nucleotide polymorphisms indicate variation between closely related strains is not maintained by positive selection, suggesting that these regions do not represent adaptive differences between strains. Thus, the most likely explanation for the

  13. Characterization of Coal Quality Based On Ash Content From M2 Coal-Seam Group, Muara Enim Formation, South Sumatra Basin

    Directory of Open Access Journals (Sweden)

    Frillia Putri Nasution

    2017-09-01

    Full Text Available Muara Enim Formation is well known as coal-bearing formation in South Sumatra Basin. As coal-bearing formation, this formation was subjects of many integrated study. Muara Enim Formation can be divided into four coal-seam group, M1, M2, M3, and M4. The M2 group comprising of Petai (C, Suban (B, Lower Mangus (A2, and Upper Mangus (A1. Depositional environments of Group M2 is transitional lower delta plain with sub-depositional are crevasse splay and distributary channel. The differentiation of both sub-depositional environments can be caused the quality of coal deposit. One of quality aspects is ash content. This research conducted hopefully can give better understanding of relationship between depositional environments to ash content. Group M2 on research area were found only Seam C, Seam B, and Seam A2, that has distribution from north to central so long as 1400 m. Coal-seam thickness C ranged between 3.25-9.25 m, Seam B range 7.54-13.43 m, and Seam C range 1.53-8.37 m, where all of coal-seams thickening on the central part and thinning-splitting to northern part and southern part. The ash content is formed from burning coal residue material. Ash contents on coal seam caused by organic and inorganic compound which resulted from mixing modified material on surrounded when transportation, sedimentation, and coalification process. There are 27 sample, consists of 9 sample from Seam C, 8 sample from Seam B, and 10 sample from Seam A2. Space grid of sampling is 100-150 m. Ash content influenced by many factors, but in research area, main factor is existence of inorganic parting. Average ash content of Seam C is 6,04%, Seam B is 5,05%, and Seam A2 is 3,8%. Low ash content influenced by settle environment with minor detrital material. High ash content caused by oxidation and erosional process when coalification process. Ash content on coal in research area originated from detritus material carried by channel system into brackish area or originated

  14. Cult and society in early Athens : Archaeological and anthropological approaches to state formation and group participation in Attica

    OpenAIRE

    van den Eijnde, F.

    2010-01-01

    This doctoral thesis addresses the question of early Athenian statehood from the vantage point of the cultic remains. One of the main tenets of this book is that the principle stage for Athenian self-representation in the Classical Period, the cult of Athena on the Acropolis, was neither the only nor the first rallying point for the inhabitants of Attica in the Early Iron Age. It is argued that the Athenaioi (the “Men of Athena”) originated as an elite group, whose franchise did not extend be...

  15. Invertebrate ichnofossils and rhizoliths associated with rhizomorphs from the Marília Formation (Echaporã Member), Bauru Group, Upper Cretaceous, Brazil

    Science.gov (United States)

    Mineiro, Adriano Santos; Santucci, Rodrigo Miloni; da Rocha, Dulce Maria Sucena; de Andrade, Marco Brandalise; Nava, William Roberto

    2017-12-01

    The Marília Formation (Bauru Group, Upper Cretaceous, Brazil) has furnished a large array of vertebrate fossils. However, its ichnological and botanical contents are poorly explored to date. Here we report findings of invertebrate trace fossils (Beaconites isp., Skolithos isp., and Taenidium barretti), rhizoliths associated with rhizomorphs with preserved hyphae, and fossil roots from the Echaporã Member, Marília Formation, São Paulo State, Brazil. The association of trace fossils suggest they can be regarded to the Scoyenia Ichnofacies. The rhizoliths indicate that at least two types of herbaceous/arbustive plants inhabited the area, one of them living in the vadose zone and the other one with roots closer to the water table, under arid/semiarid conditions. Sedimentological analyses suggest the studied outcrop comprises fluvial deposits, with predominance of sand bars that underwent different and relatively long periods of subaerial exposure.

  16. [Social security for people in need of care -- proposals for the development and financing of aids for this group (author's transl)].

    Science.gov (United States)

    Dieck, M; Fichtner, O; Gröttrup, B; Jochheim, K A; Kulenkampff, C; Lohmann, S; Mierzwiak, H G; Prössdorf, K; Robbers, I; Rückert, W

    1979-11-01

    The article points out a serious deficiency in the social security system, i.e., that the old and infirm can only seldon obtain institutional care without calling on social assistance. It discusses possible solution of including the attendance allowances into the scope of social security benefits. The solutions are formulated in the amendment of the Association of German Cities and Towns (Deutscher Städtetag) to the insurance regulations of the earlier German Reich (Reichsversicherungsordnung). It is proposed that the Länder and communities as well as, to a small extent the Federal Government, assume the responsibility for investments, whereas the legal sickness insurance funds cover the costs for medical treatment and nursing and the patient pays an estimated rent value and the "hotel services".

  17. Studying with the cloud: the use of online Web-based resources to augment a traditional study group format.

    Science.gov (United States)

    Chan, Teresa; Sennik, Serena; Zaki, Amna; Trotter, Brendon

    2015-03-01

    Cloud-based applications such as Google Docs, Skype, Dropbox, and SugarSync are revolutionizing the way that we interact with the world. Members of the millennial generation (those born after 1980) are now becoming senior residents and junior attending physicians. We describe a novel technique combining Internet- and cloud-based methods to digitally augment the classic study group used by final-year residents studying for the Royal College of Physicians and Surgeons of Canada examination. This material was developed by residents and improved over the course of 18 months. This is an innovation report about a process for enhanced communication and collaboration as there has been little research to date regarding the augmentation of learner-driven initiatives with virtual resources.

  18. [The difficult concept of "internal objects" (1934-1943). Its significance for the formation of the Klein group].

    Science.gov (United States)

    Hinshelwood, R D

    1996-06-01

    Although the concept of "inner objects" developed by Melanie Klein is hardly a major object of discussion today, it caused a furore in the ranks of the British Psychoanalytical Society in the thirties and forties. Notably the analysts from Vienna were unable to agree to the existence of inner objects engendered via processes of internalisation. The author traces the course of these discussions of a clinical problem and the confusion they caused, placing them at the same time in a specific historical context. He sees the controversy as the expression of conflicts and fears unsettling the British Psychoanalytical Society during that period, caused on the one hand by the necessary integration of the exiled Freud family and on the other by tensions within its own ranks leading ultimately to a division of the Society and the constitution of the Klein Group.

  19. Usefulness of postoperative hip irradiation in the prevention of heterotopic bone formation in a high risk group of patients

    International Nuclear Information System (INIS)

    MacLennan, I.; Keys, H.M.; Evarts, C.M.; Rubin, P.

    1984-01-01

    Heterotopic ossification is a complication of total hip arthroplasty in 14 to 30% of patients. Significant functional impairment will occur in up to 28% of patients with ectopic bone. The high risk group includes those with preexisting heterotopic bone in either hip, those suffering from hypertrophic osteoarthritis or ankylosing spondylitis and patients who have had multiple procedures on the hip. Fifty-eight patients (67 hips) were irradiated after surgical removal of ectopic bone (53 hips) or received radiation prophylaxis of heterotopic ossification (14 hips). Ninety-five percent of patients had either no bone visible or insignificant amounts of ectopic bone visible on postoperative hip X-rays. Only 5% of patients showed significant persistence of ectopic bone. Postoperative hip function was dramatically improved compared to preoperative function in all patients treated. The importance of early commencement of irradiation is emphasized

  20. Ambiência e formação de grupo em programas de caminhada Ambiance and group formation in walking programs

    Directory of Open Access Journals (Sweden)

    Marcos Warschauer

    2009-06-01

    Full Text Available O presente relato discute os conceitos de ambiência e formação de grupo por intermédio de duas experiências com grupos de caminhada desenvolvidos na Atenção Básica: o programa "Caminhando para a Saúde", em Santo André (SP, e o grupo da Unidade de Saúde Jardim Seckler, em São Paulo (SP. Ambas as experiências trabalham com a concepção de prática corporal, que amplia o conceito de atividade física ao colocar o sujeito no centro das ações, e têm como principal enfoque a promoção da saúde. A análise do processo de implementação desses programas destaca a ambiência e a formação de grupo como fatores fundamentais para a adesão à prática. O conceito de ambiência é composto de três eixos: a confortabilidade, o espaço como forma de produção de subjetividade e como instrumento facilitador de mudanças no processo de trabalho. Os dispositivos grupais promovem ações de cidadania, priorizando a solidariedade, a comunicação e os relacionamentos pessoais. Esses dois conceitos podem estar correlacionados e viabilizar outras maneiras para a implementação e o desenvolvimento de grupos de caminhada.The present report discusses the concepts of ambiance and group formation by means of two experiences with walking groups developed in Primary Care: the program "Walking for Health", in the city of Santo André, state of São Paulo, and the group of the Jardim Seckler Health Unit, in the city of São Paulo, state of São Paulo. Both experiences were developed using the body practice concept, which goes beyond the concept of physical activity, placing the person at the center of his/her own actions. The experiences' main focus is health promotion. Ambiance and group formation are fundamental factors to adhere to the walking practice. The ambiance concept is formed by three axes: comfortability, space as a way to produce subjectivity and as an instrument that facilitates change in the work process. Group activities promote

  1. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Comparative palynology of clastics and lignites from the Manning Formation, Jackson Group, Upper Eocene, Grimes County, TX

    Energy Technology Data Exchange (ETDEWEB)

    Gennett, J.A. [Texas A& M Univ., College Station, TX (United States)

    1996-09-01

    The 3500 lignite seam at the Gibbons Creek Mine in Grimes County, TX was sampled for pollen and spores at 10 cm intervals. The majority of samples are dominated (to 60%) by Momipites from the Juglandaceae (walnut family), as is typical of Jackson Group sediments. Other palynomorph taxa vary systematically, with a peak of pollen of the freshwater tree Nyssa (blackgum) and associated Rboipites angustus (to 17%) occurring at the base. Higher in the seam, increase (to 55%) of Cupuliferoipollenites (a chestnut-like grain) and Cyrillaceae-pollenites? ventosus (to 7%) percentages may indicate a higher salinity environment. A Chrysophyllum (satin leaf) peak (to 25%) near the top of the seam suggests relatively shallow fresh-water conditions. Core samples from an interval above the lignites represent a transgressive-regressive cycle in inner shelf clastics. These samples were taken at 40 cm or greater intervals and reveal the regional pollen flora. Although minor changes occur, palynomorph spectra are for the most part homogenous. The dominant grain is again Momipites coryloides, but in general percentages are lower (to 35%). Cupuliferoipollenites (to 17%), Chrysophyllum (to 5%), and Rhoipites angustus (to 3%) are not less important, but do not peak as they do in the lignite spectra. Palm leaf megafossils; in one sample suggest a clastic wetland; in this sample palm pollen (mostly Arecipites, representing the modern saw palmetto) reaches 73%. Another sample contains high (26%) percentages of the fern spore Lygodiumsporites adriennis. High percentages of these two taxa do not occur in the lignite samples.

  4. Generation of seven group cross section library for TRIGA LEU fuel in CITATION format and benchmarking some experimental and operational data

    International Nuclear Information System (INIS)

    Sarker, M.M.; Bhuiyan, S.I.; Akramuzzaman, M.

    2007-01-01

    The principal objective of this study is to validate the seven group cross section library in CITATION format for TRIGA LEU Fuel. This presentation deals with the 'generation of a cross section library for the CITATION and its validation. We used WIMSD-5B version for the generation of all group constants. The overall strategy is: (1) use WIMS package to generate few group neutron macroscopic cross section (cell constants) for all of the materials in the core and its immediate neighborhood (2) use 3-D code CITATION to perform the global analysis of the core to study: multiplication factor, neutron flux distribution and power peaking factors. Various options available in WIMS program were studied in depth to finalize the models to generate the most appropriate group constants. For the global analysis the code CITATION and a post processing program FCAP were chosen. Thus a seven group cross section library for the calculations of TRIGA Research Reactor was generated. To investigate the validity of the generated library a critical experiment of the TRIGA research reactor was benchmarked. (author)

  5. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  6. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  7. Unique Footprint in the scl1.3 Locus Affects Adhesion and Biofilm Formation of the Invasive M3-Type Group A Streptococcus.

    Science.gov (United States)

    Bachert, Beth A; Choi, Soo J; LaSala, Paul R; Harper, Tiffany I; McNitt, Dudley H; Boehm, Dylan T; Caswell, Clayton C; Ciborowski, Pawel; Keene, Douglas R; Flores, Anthony R; Musser, James M; Squeglia, Flavia; Marasco, Daniela; Berisio, Rita; Lukomski, Slawomir

    2016-01-01

    The streptococcal collagen-like proteins 1 and 2 (Scl1 and Scl2) are major surface adhesins that are ubiquitous among group A Streptococcus (GAS). Invasive M3-type strains, however, have evolved two unique conserved features in the scl1 locus: (i) an IS1548 element insertion in the scl1 promoter region and (ii) a nonsense mutation within the scl1 coding sequence. The scl1 transcript is drastically reduced in M3-type GAS, contrasting with a high transcription level of scl1 allele in invasive M1-type GAS. This leads to a lack of Scl1 expression in M3 strains. In contrast, while scl2 transcription and Scl2 production are elevated in M3 strains, M1 GAS lack Scl2 surface expression. M3-type strains were shown to have reduced biofilm formation on inanimate surfaces coated with cellular fibronectin and laminin, and in human skin equivalents. Repair of the nonsense mutation and restoration of Scl1 expression on M3-GAS cells, restores biofilm formation on cellular fibronectin and laminin coatings. Inactivation of scl1 in biofilm-capable M28 and M41 strains results in larger skin lesions in a mouse model, indicating that lack of Scl1 adhesin promotes bacterial spread over localized infection. These studies suggest the uniquely evolved scl1 locus in the M3-type strains, which prevents surface expression of the major Scl1 adhesin, contributed to the emergence of the invasive M3-type strains. Furthermore these studies provide insight into the molecular mechanisms mediating colonization, biofilm formation, and pathogenesis of group A streptococci.

  8. Unique footprint in the scl1.3 locus affects adhesion and biofilm formation of the invasive M3-type group A Streptococcus

    Directory of Open Access Journals (Sweden)

    Beth Alexandra Bachert

    2016-08-01

    Full Text Available The streptococcal collagen-like proteins 1 and 2 (Scl1 and Scl2 are major surface adhesins that are ubiquitous among group A Streptococcus (GAS. Invasive M3-type strains, however, have evolved two unique conserved features in the scl1 locus: (i an IS1548 element insertion in the scl1 promoter region and (ii a nonsense mutation within the scl1 coding sequence. The scl1 transcript is drastically reduced in M3-type GAS, contrasting with a high transcription level of scl1 allele in invasive M1-type GAS. This leads to a lack of Scl1 expression in M3 strains. In contrast, while scl2 transcription and Scl2 production are elevated in M3 strains, M1 GAS lack Scl2 surface expression. M3-type strains were shown to have reduced biofilm formation on inanimate surfaces coated with cellular fibronectin and laminin, and in human skin equivalents. Repair of the nonsense mutation and restoration of Scl1 expression on M3-GAS cells, restores biofilm formation on cellular fibronectin and laminin coatings. Inactivation of scl1 in biofilm-capable M28 and M41 strains results in larger skin lesions in a mouse model, indicating that lack of Scl1 adhesin promotes bacterial spread over localized infection. These studies suggest the uniquely evolved scl1 locus in the M3-type strains, which prevents surface expression of the major Scl1 adhesin, contributed to the emergence of the invasive M3-type strains. Furthermore these studies provide insight into the molecular mechanisms mediating colonization, biofilm formation, and pathogenesis of group A streptococci.

  9. Group Formation on a Line

    DEFF Research Database (Denmark)

    Kristensen, Gustav

    2010-01-01

    Artiklen viser at en nummerering af indsamlede evalueringsskemaer kan afsløre gruppedannelse blandt de tilhørende studenter på et stort undervisningshold. Gruppedannelsen viser sig ved at sequenser med ens bedømmelse afviger fra en tilfældig fordeling defineret som en negativ binomialfordeling, d...

  10. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  11. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  12. A randomized trial of individual versus group-format exercise and self-management in individuals with Parkinson’s disease and comorbid depression

    Directory of Open Access Journals (Sweden)

    Sajatovic M

    2017-05-01

    Full Text Available Martha Sajatovic,1,2 Angela L Ridgel,3 Ellen M Walter,1,4 Curtis M Tatsuoka,1,2 Kari Colón-Zimmermann,2 Riane K Ramsey,2 Elisabeth Welter,2 Steven A Gunzler,1,4 Christina M Whitney,1,4 Benjamin L Walter1,4 1Department of Neurology, Case Western Reserve University School of Medicine, 2Neurological and Behavioral Outcomes Center, University Hospitals Cleveland Medical Center, Cleveland, 3Department of Exercise Physiology, Kent State University, Kent, 4Movement Disorders Center, University Hospitals Cleveland Medical Center, Cleveland, OH, USA Background: Depression is common in people with Parkinson’s disease (PD, and exercise is known to improve depression and PD. However, lack of motivation and low self-efficacy can make exercise difficult for people with PD and comorbid depression (PD-Dep. A combined group exercise and chronic disease self-management (CDSM program may improve the likelihood that individuals will engage in exercise and will show a reduction in depression symptoms. The purpose of this study was to compare changes in depression in PD-Dep between individual versus group exercise plus CDSM and to examine participant adherence and perception of the interventions.Methods: Participants (N=30 were randomized to either Enhanced EXerCisE thErapy for PD (EXCEED; group CDSM and exercise or self-guided CDSM plus exercise. Outcomes were change in depression assessed with the Montgomery–Asberg Depression Rating Scale (MADRS, cognition, apathy, anxiety, sleep, quality of life, motor function, self-efficacy, and patient satisfaction.Results: Both groups showed significant improvement in MADRS (P<0.001 with no significant group difference. Individuals in EXCEED group enjoyed the group dynamics but noted difficulty with the fixed-time sessions.Conclusion: Both group CDSM plus exercise and self-guided CDSM plus exercise can improve depression in PD-Dep. These findings suggest that development of a remotely delivered group-based CDSM format

  13. Methods for estimating the enthalpy of formation of inorganic compounds; thermochemical and crystallographic investigations of uranyl salts of group VI elements

    International Nuclear Information System (INIS)

    Brandenburg, N.P.

    1978-01-01

    The first part of this thesis is concerned with parameter methods for estimating the standard enthalpy of formation, ΔH 0 sub(f), of inorganic compounds. In this type of method the estimate is a function of parameters, assigned to cation and anion, respectively. The usefulness of a new estimation method is illustrated in the case of uranyl sulphide. In the second part of this thesis crystallographic and thermochemical properties of uranyl salts of group VI elements are described. Crystal structures are given for β-UO 2 SO 4 , UO 2 SeO 3 , and α-UO 2 SeO 4 . Thermochemical measurements have been restricted to the determination of ΔH 0 sub(f)(UO 2 SO 3 ) and ΔH 0 sub(f)(UO 2 TeO 3 ) by means of isoperibol solution calorimetry. (Auth.)

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. Analyse des effets de deux modalités de constitution des groupes dans un dispositif hybride de formation à distance

    Directory of Open Access Journals (Sweden)

    Christian Depover

    2004-01-01

    Full Text Available Cette étude porte sur les effets de deux modalités de constitution des groupes (spontané versus contrasté dans un dispositif hybride de formation à distance destiné à des étudiants universitaires. Les scénarios d’apprentissage mis en œuvre à l’occasion de cette expérience reposent sur l’utilisation des cartes conceptuelles comme support au travail collaboratif. Les résultats observés n’ont pas permis de mettre en évidence de différence quant à la densité conceptuelle des cartes ou au nombre d’unités de sens produites. Par contre, il apparaît que les unités de sens qui concernent les activités de planification et les commentaires métacognitifs sont nettement plus nombreuses au sein des groupes constitués par pairage contrasté. Une corrélation positive entre l’intensité des interactions à l’intérieur du forum et la densité conceptuelle des cartes produites a également été mise en évidence pour les groupes constitués sur la base d’un pairage contrasté. En ce qui concerne le pairage spontané, nos résultats indiquent que les paires constituées témoignent d’un comportement plus homogène, se révèlent plus collaboratives et consacrent moins d’effort à la planification du travail de groupe.

  16. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Galaxy And Mass Assembly (GAMA): Gas Fueling of Spiral Galaxies in the Local Universe. I. The Effect of the Group Environment on Star Formation in Spiral Galaxies

    Science.gov (United States)

    Grootes, M. W.; Tuffs, R. J.; Popescu, C. C.; Norberg, P.; Robotham, A. S. G.; Liske, J.; Andrae, E.; Baldry, I. K.; Gunawardhana, M.; Kelvin, L. S.; Madore, B. F.; Seibert, M.; Taylor, E. N.; Alpaslan, M.; Brown, M. J. I.; Cluver, M. E.; Driver, S. P.; Bland-Hawthorn, J.; Holwerda, B. W.; Hopkins, A. M.; Lopez-Sanchez, A. R.; Loveday, J.; Rushton, M.

    2017-03-01

    We quantify the effect of the galaxy group environment (for group masses of 1012.5-1014.0 M ⊙) on the current star formation rate (SFR) of a pure, morphologically selected sample of disk-dominated (I.e., late-type spiral) galaxies with redshift ≤0.13. The sample embraces a full representation of quiescent and star-forming disks with stellar mass M * ≥ 109.5 M ⊙. We focus on the effects on SFR of interactions between grouped galaxies and the putative intrahalo medium (IHM) of their host group dark matter halos, isolating these effects from those induced through galaxy-galaxy interactions, and utilizing a radiation transfer analysis to remove the inclination dependence of derived SFRs. The dependence of SFR on M * is controlled for by measuring offsets Δlog(ψ *) of grouped galaxies about a single power-law relation in specific SFR, {\\psi }* \\propto {M}* -0.45+/- 0.01, exhibited by non-grouped “field” galaxies in the sample. While a small minority of the group satellites are strongly quenched, the group centrals and a large majority of satellites exhibit levels of ψ * statistically indistinguishable from their field counterparts, for all M *, albeit with a higher scatter of 0.44 dex about the field reference relation (versus 0.27 dex for the field). Modeling the distributions in Δlog(ψ *), we find that (I) after infall into groups, disk-dominated galaxies continue to be characterized by a similar rapid cycling of gas into and out of their interstellar medium shown prior to infall, with inflows and outflows of ˜1.5-5 x SFR and ˜1-4 x SFR, respectively; and (II) the independence of the continuity of these gas flow cycles on M * appears inconsistent with the required fueling being sourced from gas in the circumgalactic medium on scales of ˜100 kpc. Instead, our data favor ongoing fueling of satellites from the IHM of the host group halo on ˜Mpc scales, I.e., from gas not initially associated with the galaxies upon infall. Consequently, the color

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Influence of surface oxygenated groups on the formation of active Cu species and the catalytic activity of Cu/AC catalyst for the synthesis of dimethyl carbonate

    Science.gov (United States)

    Zhang, Guoqiang; Li, Zhong; Zheng, Huayan; Hao, Zhiqiang; Wang, Xia; Wang, Jiajun

    2016-12-01

    Activated carbon (AC) supported Cu catalysts are employed to study the influence of surface oxygenated groups on the formation of active Cu species and the catalytic activity of Cu/AC catalyst for oxidative carbonylation of methanol to dimethyl carbonate (DMC). The AC supports are thermal treated under different temperatures in order to adjust the levels of surface oxygenated groups. The AC supports are characterized by BET, TPD-MS and XRD, and the Cu/AC catalysts are characterized by BET, XRD, TEM, XPS, AAS, CH3OH-TPD and N2O chemisorption. The results show that as the treatment temperature is below 800 °C, the BET surface area of the corresponding AC supports are nearly unchanged and close to that of the original AC (1529.6 m2/g). But as the thermal treatment temperature is elevated from 1000 to 1600 °C, the BET surface area of AC supports gradually decreases from 1407.6 to 972.2 m2/g. After loading of Cu, the BET surface area of copper catalysts is in the range of 834.4 to 1545.3 m2/g, which is slightly less than that of the respective supports. When AC is thermal treated at 400 and 600 °C, the unstable carboxylic acid and anhydrides groups are selectively removed, which has weakened the mobility and agglomeration of Cu species during the calcination process, and thus improve the Cu species dispersion over AC support. But as the treatment temperature is elevated from 600 °C to 1200 °C, the Cu species dispersion begins to decline suggesting further removal of stable surface oxygenated groups is unfavorable for Cu species dispersion. Moreover, higher thermal treatment temperature (above 1200 °C) promotes the graphitization degree of AC and leds to the decrease of Cu loading on AC support. Meanwhile, the removal of surface oxygenated groups by thermal treatment is conducive to the formation of more π-sites, and thus promote the reduction of Cu2+ to Cu+ and Cu0 as active centers. The specific surface area of (Cu+ + Cu0) is improved by thermal treatment of AC

  5. A snake venom group IIA PLA2 with immunomodulatory activity induces formation of lipid droplets containing 15-d-PGJ2 in macrophages.

    Science.gov (United States)

    Giannotti, Karina Cristina; Leiguez, Elbio; Carvalho, Ana Eduarda Zulim de; Nascimento, Neide Galvão; Matsubara, Márcio Hideki; Fortes-Dias, Consuelo Latorre; Moreira, Vanessa; Teixeira, Catarina

    2017-06-22

    Crotoxin B (CB) is a catalytically active group IIA sPLA 2 from Crotalus durissus terrificus snake venom. In contrast to most GIIA sPLA 2 s, CB exhibits anti-inflammatory effects, including the ability to inhibit leukocyte functions. Lipid droplets (LDs) are lipid-rich organelles associated with inflammation and recognized as a site for the synthesis of inflammatory lipid mediators. Here, the ability of CB to induce formation of LDs and the mechanisms involved in this effect were investigated in isolated macrophages. The profile of CB-induced 15-d-PGJ 2 (15-Deoxy-Delta-12,14-prostaglandin J 2 ) production and involvement of LDs in 15-d-PGJ 2 biosynthesis were also investigated. Stimulation of murine macrophages with CB induced increased number of LDs and release of 15-d-PGJ 2 . LDs induced by CB were associated to PLIN2 recruitment and expression and required activation of PKC, PI3K, MEK1/2, JNK, iPLA 2 and PLD. Both 15-d-PGJ 2 and COX-1 were found in CB-induced LDs indicating that LDs contribute to the inhibitory effects of CB by acting as platform for synthesis of 15-d-PGJ 2 , a pro-resolving lipid mediator. Together, our data indicate that an immunomodulatory GIIA sPLA 2 can directly induce LD formation and production of a pro-resolving mediator in an inflammatory cell and afford new insights into the roles of LDs in resolution of inflammatory processes.

  6. Development of a Web-Based Intervention for Addressing Distress in Caregivers of Patients Receiving Stem Cell Transplants: Formative Evaluation With Qualitative Interviews and Focus Groups

    Science.gov (United States)

    Pensak, Nicole Amoyal; Joshi, Tanisha; Simoneau, Teresa; Kilbourn, Kristin; Carr, Alaina; Kutner, Jean; Laudenslager, Mark L

    2017-06-22

    Caregivers of cancer patients experience significant burden and distress including depression and anxiety. We previously demonstrated the efficacy of an eight session, in-person, one-on-one stress management intervention to reduce distress in caregivers of patients receiving allogeneic hematopoietic stem cell transplants (allo-HSCT). The objective of this study was to adapt and enhance the in-person caregiver stress management intervention to a mobilized website (eg, tablet, smartphone, or computer-based) for self-delivery in order to enhance dissemination to caregiver populations most in need. We used an established approach for development of a mhealth intervention, completing the first two research and evaluation steps: Step One: Formative Research (eg, expert and stakeholder review from patients, caregivers, and palliative care experts) and Step Two: Pretesting (eg, Focus Groups and Individual Interviews with caregivers of patients with autologous HSCT (auto-HSCT). Step one included feedback elicited for a mock-up version of Pep-Pal session one from caregiver, patients and clinician stakeholders from a multidisciplinary palliative care team (N=9 caregivers and patient stakeholders and N=20 palliative care experts). Step two included two focus groups (N=6 caregivers) and individual interviews (N=9 caregivers) regarding Pep-Pal's look and feel, content, acceptability, and potential usability/feasibility. Focus groups and individual interviews were audio-recorded. In addition, individual interviews were transcribed, and applied thematic analysis was conducted in order to gain an in-depth understanding to inform the development and refinement of the mobilized caregiver stress management intervention, Pep-Pal (PsychoEducation and skills for Patient caregivers). Overall, results were favorable. Pep-Pal was deemed acceptable for caregivers of patients receiving an auto-HSCT. The refined Pep-Pal program consisted of 9 sessions (Introduction to Stress, Stress and the

  7. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  8. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  9. Mixed-Format Test Score Equating: Effect of Item-Type Multidimensionality, Length and Composition of Common-Item Set, and Group Ability Difference

    Science.gov (United States)

    Wang, Wei

    2013-01-01

    Mixed-format tests containing both multiple-choice (MC) items and constructed-response (CR) items are now widely used in many testing programs. Mixed-format tests often are considered to be superior to tests containing only MC items although the use of multiple item formats leads to measurement challenges in the context of equating conducted under…

  10. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  11. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  12. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  14. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  15. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  16. Ideology, interest-group formation, and protest: the case of the anti-nuclear power movement, the Clamshell Alliance, and the New Left

    International Nuclear Information System (INIS)

    Cohen, E.M.

    1981-01-01

    The thesis analyzes the development of the Clamshell Alliance, the first and most successful anti-nuclear power protest group. The key question the dissertation asks is how did this organization stage such popular and well-attended protests during a period when leftist political activity seemed to have died out, and little mass protest was taking place. The thesis also explores why the Clamshell Alliance disintegrated at the same time as the anti-nuclear power movement's cause was gaining public acceptance in the wake of the Three Mile Island power-plant accident. The thesis finds that the principal resources the Clamshell drew upon to solve the problems of organizational formation were the activists, organizations, and ideology of the surviving New Left. The dissertation studies the struggles of the Clamshell Alliance as an example of the recurrent problems of leftist political activism in the U.S. It is concluded that only under special conditions can protest outside of regular political channels be both popular and effective. It is also proved that a larger organizational and ideological legacy of the sixties remains than is generally recongnized. Leftist beliefs continued to have adherents even after the protests stopped. Further, many individuals who came to political maturity after the sixties also were found to hold leftist beliefs. However, the political potential of this group can only be realized when an organization temporarily overcomes the barriers to mass leftist political action by developing an issue and a set of tactics that can appeal to leftists and nonleftists alike. Between such special acts of innovation the Left remains a political undercurrent outside of mainstream politics and without a means of effective influence because of its unwillingness to engage in conventional politics

  17. Paleomagnetic and magnetostratigraphic investigations of the whitehorse group/quartermaster (Dewey Lake) formation (upper permian-lowermost triassic) in the Palo Duro basin, northwest Texas, USA

    Science.gov (United States)

    Collins, Dylan R.

    In northwest Texas, upper Permian to lowermost Triassic hematite-cemented detrital sedimentary rocks, which include a small number of regionally extensive ash beds, were deposited during the time interval of the greatest mass extinction event sequences in Earth history. The magnetic polarity stratigraphy, as well as key rock magnetic properties, of the upper Whitehorse Group (WH) and Quartermaster formations (QM) at selected sections in the Palo Duro Basin, have been determined using thermal, and chemical demagnetization approaches and anisotropy of magnetic susceptibility, acquisition of isothermal remanent magnetization (IRM) and backfield demagnetization, and thermal demagnetization of three component IRM methods. Demagnetization results show that the WH/QM contains a primary/near-primary characteristic remanent magnetization at each level sampled and thus the magnetic polarity stratigraphy for each section can be compared with existing polarity time scales across the Permian-Triassic boundary. Estimated site mean directions yield a paleomagnetic pole for the latest Permian for North America of 57.8°N, 130.6°E from 38 sampled sites.

  18. Filamentation and light bullet formation dynamics in solid-state dielectric media with weak, moderate and strong anomalous group velocity dispersion

    International Nuclear Information System (INIS)

    Gražulevičiūtė, I; Garejev, N; Majus, D; Tamošauskas, G; A Dubietis; Jukna, V

    2016-01-01

    We present a series of measurements, which characterize filamentation dynamics of intense ultrashort laser pulses in the space–time domain, as captured by means of three-dimensional imaging technique in sapphire and fused silica, in the wavelength range of 1.45–2.25 μm, accessing the regimes of weak, moderate and strong anomalous group velocity dispersion (GVD). In the regime of weak anomalous GVD (at 1.45 μm), pulse splitting into two sub-pulses producing a pair of light bullets with spectrally shifted carrier frequencies in both nonlinear media is observed. In contrast, in the regimes of moderate (at 1.8 μm) and strong (at 2.25 μm) anomalous GVD we observe notably different transient dynamics, which however lead to the formation of a single self-compressed quasistationary light bullet with an universal spatiotemporal shape comprised of an extended ring-shaped periphery and a localized intense core that carries the self-compressed pulse. (paper)

  19. Filamentation and light bullet formation dynamics in solid-state dielectric media with weak, moderate and strong anomalous group velocity dispersion

    Science.gov (United States)

    Gražulevičiūtė, I.; Garejev, N.; Majus, D.; Jukna, V.; Tamošauskas, G.; Dubietis, A.

    2016-02-01

    We present a series of measurements, which characterize filamentation dynamics of intense ultrashort laser pulses in the space-time domain, as captured by means of three-dimensional imaging technique in sapphire and fused silica, in the wavelength range of 1.45-2.25 μm, accessing the regimes of weak, moderate and strong anomalous group velocity dispersion (GVD). In the regime of weak anomalous GVD (at 1.45 μm), pulse splitting into two sub-pulses producing a pair of light bullets with spectrally shifted carrier frequencies in both nonlinear media is observed. In contrast, in the regimes of moderate (at 1.8 μm) and strong (at 2.25 μm) anomalous GVD we observe notably different transient dynamics, which however lead to the formation of a single self-compressed quasistationary light bullet with an universal spatiotemporal shape comprised of an extended ring-shaped periphery and a localized intense core that carries the self-compressed pulse.

  20. Group X

    Energy Technology Data Exchange (ETDEWEB)

    Fields, Susannah

    2007-08-16

    This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for the purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.

  1. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  2. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  3. Coal geology of the Paleocene-Eocene Calvert Bluff Formation (Wilcox Group) and the Eocene Manning Formation (Jackson Group) in east-central Texas; field trip guidebook for the Society for Organic Petrology, Twelfth Annual Meeting, The Woodlands, Texas, August 30, 1995

    Science.gov (United States)

    Warwick, Peter D.; Crowley, Sharon S.

    1995-01-01

    The Jackson and Wilcox Groups of eastern Texas (fig. 1) are the major lignite producing intervals in the Gulf Region. Within these groups, the major lignite-producing formations are the Paleocene-Eocene Calvert Bluff Formation (Wilcox) and the Eocene Manning Formation (Jackson). According to the Keystone Coal Industry Manual (Maclean Hunter Publishing Company, 1994), the Gulf Coast basin produces about 57 million short tons of lignite annually. The state of Texas ranks number 6 in coal production in the United States. Most of the lignite is used for electric power generation in mine-mouth power plant facilities. In recent years, particular interest has been given to lignite quality and the distribution and concentration of about a dozen trace elements that have been identified as potential hazardous air pollutants (HAPs) by the 1990 Clean Air Act Amendments. As pointed out by Oman and Finkelman (1994), Gulf Coast lignite deposits have elevated concentrations of many of the HAPs elements (Be, Cd, Co, Cr, Hg, Mn, Se, U) on a as-received gm/mmBtu basis when compared to other United States coal deposits used for fuel in thermo-electric power plants. Although regulations have not yet been established for acceptable emissions of the HAPs elements during coal burning, considerable research effort has been given to the characterization of these elements in coal feed stocks. The general purpose of the present field trip and of the accompanying collection of papers is to investigate how various aspects of east Texas lignite geology might collectively influence the quality of the lignite fuel. We hope that this collection of papers will help future researchers understand the complex, multifaceted interrelations of coal geology, petrology, palynology and coal quality, and that this introduction to the geology of the lignite deposits of east Texas might serve as a stimulus for new ideas to be applied to other coal basins in the U.S. and abroad.

  4. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  5. Accelaration of Jamkesda (Regional Health Security Participation and Jamkesda Member Visit based on Age Group Phenomenon in Nganjuk Regency PHC, Year 2012

    Directory of Open Access Journals (Sweden)

    Mugeni Sugiharto

    2015-03-01

    ABSTRACTBackground:Introduction: Jamkesda is pro- poor government policy to fulfill their health care right base on mandate of law. Departemen of Health in Nganjuk Regency run socialization by involving all local power Hence, in 2012 Jamkesda participation would reach highest in East Java. Purpose:This resaerch aimed to identify Jamkesda participation acceleration and Jamkesda member visit based on age group phenomenon in Nganjuk Regency year 2012. Method:Descriptive research with cross sectional design. Population was Nganjuk Regency government Agency with all Jamkesda managing agencies as sample. Analysis unit was institution. Respondents were officials who managed Jamkesda.Result:Jamkesda in Nganjuk Regency was integrate to Sub Divison of Special Service an Health Costing primary task. In 2012 it showed highest Jamkesda participation in East Java. Socialization strengthening in form of social support and advocacy and media use to accelerate local health coverage and to erase Poor Notification Letter to have medication. Medication visit phenomenon was varied in number in every district, the highest was Nganjuk District (11.18%. Women (56.1% who took medication in PHC was higher than men (43,99% particularly those at 15–< 54 years old age group. The commonest disease was hypertension. Conclusion: Participation acceleration through social support and advocacy strategy is able to obtain local public support both formal and non formal for its success. Highest medication visit to PHC was Nganjuk district by women with hypertension as commonest disease they complained. Suggestion:Social support and advocacy socialization strategy can be implemented in other places with similar situation and condition Key words: Jamkesda, Socialization, Social Support, Advocacy

  6. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  7. Multiple embryos in the Lepidocyclina pustulosa group as possible indicators of palaeoenvironmental conditions: The case of the Late Eocene Toluviejo Formation (Sinú Domain, Caribbean, Colombia

    Science.gov (United States)

    Baumgartner-Mora, Claudia; Baumgartner, Peter O.; Rincón Martínez, Daniel; Salazar Ortiz, Edward A.

    2016-04-01

    The Middle-Late Eocene Toluviejo Formation of the Sinú-San Jacinto folded belt (Caribbean, Colombia) contains 15-75 m thick, grey, massive limestone sequences that are interbedded with terrigenous nearshore to offshore mudstones to quartzose sandstones and conglomerates. The formation accumulated in a transitional continent-ocean setting, probably on oceanic crust. We studied over 80 polished thin sections under light microscopy and cathodoluminescence (CL) to analyse carbonate microfacies and Larger Benthic Foraminifera (LBF). The overall facies distribution is 3-fold: (1) Facies close to the shoreline are dominated by low diversity operculinid assemblages, rich in detrital elements. (2) Shallow offshore facies are characterized by round lepidocyclinids, associated with, and often encrusted by, corallinacean algae, Sporolithon and structureless microbial crusts. The matrix is rich in carbonate/detrital mud and sand-sized detritals. (3) Distal offshore facies on structural highs show abundance of flat, current-sorted lepidoclinids without a noticeable detrital component. Facies 1 and 2 are clearly under the influence of suspension- and dissolved-nutrient input, probably carried offshore by freshwater lids of river plumes. Facies (2) contains abundant specimens of the Lepidocyclina pustulosa group of which the macrospheric forms show complicated embryonic apparatuses, which suppose double or multiple embryos. Detailed observation under CL allows to count up to 6-8 embryos, often seen aligned in the equatorial plane. The embryonic apparatus occupies often more than half of the diameter of specimens. The tendency towards large, very flat embryonic apparatuses (diameter measured in axial cuts up to 2,5 mm for a thickness of 0.2-0.3 mm) is closely correlated with abundant coralgal and microbial encrustations, oxide-stained carbonate/detrital mud and probably some preserved organic matter. The presence of multiple embryos has been reported by several authors and has

  8. Petrography and geochemistry of selected lignite beds in the Gibbons Creek mine (Manning Formation, Jackson Group, Paleocene) of east-central Texas

    Science.gov (United States)

    Warwick, Peter D.; Crowley, Sharon S.; Ruppert, Leslie F.; Pontolillo, James

    1997-01-01

    This study examined the petrographic and geochemical characteristics of two lignite beds (3500 and 4500 beds, Manning Formation, Jackson Group, Eocene) that are mined at the Gibbons Creek mine in east-central Texas. The purpose of the study was to identify the relations among sample ash yield, coal petrography, and trace-element concentrations in lignite and adjoining rock layers of the Gibbons Creek mine. Particular interest was given to the distribution of 12 environmentally sensitive trace elements (As, Be, Cd, Cr, Co, Hg, Mn, Ni, Pb, Sb, Se, and U) that have been identified as potentially hazardous air pollutants (HAPs) in the United States Clean Air Act Amendments of 1990. Eleven lignite, floor, and rock parting samples were collected from incremental channel samples of the 3500 and 4500 beds that were exposed in a highwall of pit A3 at the Gibbons Creek mine. Short proximate and ultimate and forms of sulfur analyses were performed on all lignite samples, and lignite and rock samples were analyzed for 60 major, minor and trace elements. Representative splits of all lignite samples were ground and cast into pellets, and polished for petrographic analyses in blue-light fluorescence and reflected white light to determine liptinite, inertinite, and huminite maceral group percentages. The following observations summarize our results and conclusions about the geochemistry, petrography, and sedimentology of the 3500 and 4500 beds of the Gibbons Creek lignite deposit: (1) Weighted average dry (db) ash yield for the two beds is 29.7%, average total sulfur content is 2.6%, and average calorific value is 7832 Btu (18.22 MJ/kg). Ash yields are greatest in the lower bench (59.33% db) of the 3500 bed and in the upper bench of the 4500 bed (74.61% db). (2) For lignite samples (on a whole-coal basis), the distributions of two of the HAPs (Pb and Sb) are positively related to ash yield, probably indicating an inorganic affinity for these elements. By using cluster analysis we

  9. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  10. Efficacy of interpersonal therapy-group format adapted to post-traumatic stress disorder: an open-label add-on trial.

    Science.gov (United States)

    Campanini, Rosaly F B; Schoedl, Aline F; Pupo, Mariana C; Costa, Ana Clara H; Krupnick, Janice L; Mello, Marcelo F

    2010-01-01

    Post-traumatic stress disorder (PTSD) is a highly prevalent condition, yet available treatments demonstrate only modest efficacy. Exposure therapies, considered by many to be the "gold-standard" therapy for PTSD, are poorly tolerated by many patients and show high attrition. We evaluated interpersonal therapy, in a group format, adapted to PTSD (IPT-G PTSD), as an adjunctive treatment for patients who failed to respond to conventional psychopharmacological treatment. Research participants included 40 patients who sought treatment through a program on violence in the department of psychiatry of Federal University of São Paulo (UNIFESP). They had received conventional psychopharmacological treatment for at least 12 weeks and failed to have an adequate clinical response. After signing an informed consent, approved earlier by the UNIFESP Ethics Review Board, they received a semi-structured diagnostic interview (SCID-I), administered by a trained mental health worker, to confirm the presence of a PTSD diagnosis according to DSM-IV criteria. Other instruments were administered, and patients completed out self-report instruments at baseline, and endpoint to evaluate clinical outcomes. Thirty-three patients completed the trial, but all had at least one second outcome evaluation. There were significant improvements on all measures, with large effect sizes. IPT-G PTSD was effective not only in decreasing symptoms of PTSD, but also in decreasing symptoms of anxiety and depression. It led to significant improvements in social adjustment and quality of life. It was well tolerated and there were few dropouts. Our results are very preliminary; they need further confirmation through randomized controlled clinical trials.

  11. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  12. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  13. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  14. Selected Data for Wells and Test Holes Used in Structure-Contour Maps of the Inyan Kara Group, Minnekahta Limestone, Minnelusa Formation, Madison Limestone, and Deadwood Formation in the Black Hills Area, South Dakota

    National Research Council Canada - National Science Library

    Carter, Janet M

    1999-01-01

    This report presents selected data on wells and test holes that were used in the construction of structure-contour maps of selected formations that contain major aquifers in the Black Hills area of western South Dakota...

  15. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  16. Il contributo delle scienze criminologiche per la formazione degli esperti nel settore della sicurezza / La contribution des sciences criminologiques à la formation des professionnels dans le domaine de la sécurité / The contribution of criminological sciences to the training of experts in the field of security

    Directory of Open Access Journals (Sweden)

    Balloni Augusto

    2013-03-01

    expression française sécurité.Par conséquent, on souligne qu’il est nécessaire que les institutions de formation soient en mesure de favoriser la constitution du groupe de recherche-action.The evolution of both common and organised crime leads to greater vulnerability among all parties, both public or private, involved in generating wealth; in addition, natural disasters or disasters brought about by human action are rendering the earth increasingly vulnerable in a number of countries throughout the world. Consequently, security becomes fundamental and is closely connected with the concept of risk: it is essential to have a clear picture of the state of the art of the scientific development of security and criminology, since security, within the dynamics of social events, is conditioned by many factors, and is thus considered a polysemantic term. Therefore, the issues pertaining to security may be summed up using the formula S = f (P,E, where S is for security, P for people, in the sense of groups of persons, right up to state organisations, and E for environment, in the widest sense of the term (town, region, country and whereby security is dependent on P as it relates to E. It follows that the set-up of courses related to security must have a polycentric nature.

  17. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  18. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  19. The Jurassic of Denmark and Greenland: Palynostratigraphy and palaeoenvironment of the Middle Jurassic Sortehat Formation (Neill Klinter Group, Jameson Land, East Greenland

    Directory of Open Access Journals (Sweden)

    Koppelhus, Eva B.

    2003-10-01

    Full Text Available The grey–black mudstones of the Sortehat Formation form part of the Middle Jurassic fill of the Jameson Land Basin in East Greenland. The formation is exposed in the southernmost part of the north–south-trending, Mesozoic rift system in East Greenland that was part of the epeiric seaway between East Greenland and Norway. Sedimentological observations of the Sortehat Formation indicate deposition in an offshore marine setting that was typically low energy and periodically oxygen-deficient but was influenced by storm currents on occasion. Detailed palynological studies of the Sortehat Formation have resulted in the definition of three palynological assemblage zones recognised at four localities, namely Enhjørningen Dal and Pelion (north Jameson Land, the type section at Sortehat (central Jameson Land and Albuen at Neill Klinter along Hurry Inlet(south-east Jameson Land. In stratigraphic order, these zones are termed the Botryococcus Assemblage Zone, the Nannoceratopsis gracilis – Nannoceratopsis senex Assemblage Zone, and the Sentusidinium pelionense Assemblage Zone. They are recognised on the basis of the identification of approximately 110 species of palynomorphs, including 45 species of spores, 30 of pollen, 22 of dinoflagellate cysts, 10 acritarch species, two species of algae, and some fungal spores. An Aalenian – ?Early Bajocian age is suggested for the Sortehat Formation on the basis of thepalynoflora.Interpretation of the palynomorph assemblages suggests that the formation accumulated in a shallow, brackish marine environment. A significant terrestrial input, including the freshwater greenalga Botryococcus, is recorded in the lower part of the formation and interpreted as an allochthonous accumulation in an offshore marine environment related to transgression of a low-lyingcoastal plain. A marked shift in the palynomorph assemblage seen by diversification of marine microplankton above the base of the formation, indicates an

  20. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  1. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  2. Tonian paleomagnetism of the red beds of Madiyi Formation, lower Banxi Group in South China: implications for pre-Sturtian climate, Rodinia reconstruction and true polar wander

    Science.gov (United States)

    Hanbiao, X.; Zhang, S.; Xiao, Q.; Li, H.; Chang, L.; Fu, H.; Liu, R.

    2017-12-01

    We present a new Tonian paleomagnetic pole from the red beds of ca. 810 Ma Madiyi Formation, lower Banxi Group in the central South China Block (SCB). Detailed thermal demagnetization reveals two distinct magnetic components among the samples. A low temperature component (LTC), removed from almost all the samples below 580°C, yielded a paleopole at 68.0°N, 211.7°E (A95=1.9) that is close to the pole of late Jurassic. The high temperature component (HTC), isolated between 580-690°C, gave a mean direction of D=310.0°, I=57.4°, α95=3.7 (108 samples of 13 sites) after bedding correction, corresponding to a paleomagnetic pole at 47.6°N, 46.7°E (A95=5.6°). The HTC passed a reversal test on 95% and 99% confidence level. Directional distribution of the HTC show significant elongation which may indicate inclination shallowing, and the inclination was corrected to 75.1° using E/I technique, corresponding to a paleolatitude at 60.8±3.4° of research area. The paleopole calculated from the E/I-corrected HTC is at 44.8°N, 80.2°E (A95=3.4°), being significantly distinct from any younger poles of the SCB. This new pole plus existing high quality paleomagnetic poles from the SCB demonstrate that the SCB experienced a polar-equatorial region drifting tendency from 825 Ma to Cambrian. The high-paleolatitude red beds rather than glacial sediments deposited in the SCB, combined with coeval widespread evaporative in other continents, possibly suggest pre-Cryogenian global greenhouse climate. In our reconstruction at 800 Ma, the SCB was placed on the northwest periphery of Rodinia, with its western margin adjacent to the northern India, rather than occupying a central position of Rodinia. The distribution of 825-750 Ma poles of the SCB, East Svalbard, Australia, Laurentia, India along a great arc may be associated with true polar wander around 800 Ma.

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  4. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  6. Stratigraphic and structural data for the Conasauga Group and the Rome Formation on the Copper Creek fault block near Oak Ridge, Tennessee: preliminary results from test borehole ORNL-JOY No. 2

    International Nuclear Information System (INIS)

    Haase, C.S.; Walls, E.C.; Farmer, C.D.

    1985-06-01

    To resolve long-standing problems with the stratigraphy of the Conasauga Group and the Rome Formation on the Copper Creek fault block near Oak Ridge National Laboratory (ORNL), an 828.5-m-deep test borehole was drilled. Continuous rock core was recovered from the 17.7- to 828.5-m-deep interval; temperature, caliper, neutron, gamma-ray, and acoustic (velocity and televiewer) logs were obtained. The Conasauga Group at the study site is 572.4 m thick and comprises six formations that are - in descending stratigraphic order - Maynardville Limestone (98.8 m), Nolichucky Shale (167.9 m), Maryville Limestone (141.1 m), Rogersville Shale (39.6 m), Rutledge Limestone (30.8 m), and Pumpkin Valley Shale (94.2 m). The formations are lithologically complex, ranging from clastics that consist of shales, mudstones, and siltstones to carbonates that consist of micrites, wackestones, packstones, and conglomerates. The Rome Formation is 188.1 m thick and consists of variably bedded mudstones, siltstones, and sandstones. The Rome Formation thickness represents 88.1 m of relatively undeformed section and 100.0 m of highly deformed, jumbled, and partially repeated section. The bottom of the Rome Formation is marked by a tectonic disconformity that occurs within a 46-m-thick, intensely deformed interval caused by motion along the Copper Creek fault. Results from this study establish the stratigraphy and the lithology of the Conasauga Group and the Rome Formation near ORNL and, for the first time, allow for the unambiguous correlation of cores and geophysical logs from boreholes elsewhere in the ORNL vicinity. 45 refs., 26 figs., 2 tabs

  7. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  8. Instant Spring security starter

    CERN Document Server

    Jagielski, Piotr

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following the Starter guide approach.This book is for people who have not used Spring Security before and want to learn how to use it effectively in a short amount of time. It is assumed that readers know both Java and HTTP protocol at the level of basic web programming. The reader should also be familiar with Inversion-of-Control/Dependency Injection, preferably with the Spring framework itsel

  9. Splitting of 9-iodo-1,7-carborane by potassium hydroxide in butanol with butoxy group substitution for iodine atom when formation of anions of 1-butoxy- and 5-butoxy-nido-7,9-dicarbaundecaborate

    International Nuclear Information System (INIS)

    Zakharkin, L.I.; Ol'shevskaya, V.A.; Guseva, V.V.; Panfilova, S.Yu.

    2000-01-01

    The 9-iodo-1,7-carborane by heating in the potassium hydroxide butanol solution is splitted into the stereoisomeric anions of the nido-7,9-dicarbaundecaborate substituting under the reaction conditions the butoxy-group for iodine atom with formation of anions of the 1-butoxy- and -butoxy-nido-7,9-dicarbaundecaborate [ru

  10. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  13. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  14. Individual-level movement bias leads to the formation of higher-order social structure in a mobile group of baboons.

    Science.gov (United States)

    Bonnell, Tyler R; Clarke, Parry M; Henzi, S Peter; Barrett, Louise

    2017-07-01

    In mobile social groups, influence patterns driving group movement can vary between democratic and despotic. The arrival at any single pattern of influence is thought to be underpinned by both environmental factors and group composition. To identify the specific patterns of influence driving travel decision-making in a chacma baboon troop, we used spatially explicit data to extract patterns of individual movement bias. We scaled these estimates of individual-level bias to the level of the group by constructing an influence network and assessing its emergent structural properties. Our results indicate that there is heterogeneity in movement bias: individual animals respond consistently to particular group members, and higher-ranking animals are more likely to influence the movement of others. This heterogeneity resulted in a group-level network structure that consisted of a single core and two outer shells. Here, the presence of a core suggests that a set of highly interdependent animals drove routine group movements. These results suggest that heterogeneity at the individual level can lead to group-level influence structures, and that movement patterns in mobile social groups can add to the exploration of both how these structures develop (i.e. mechanistic aspects) and what consequences they have for individual- and group-level outcomes (i.e. functional aspects).

  15. Data backup security in cloud storage system

    OpenAIRE

    Атаян, Борис Геннадьевич; Национальный политехнический университет Армении; Багдасарян, Татевик Араевна; Национальный политехнический университет Армении

    2016-01-01

    Cloud backup system is proposed, which provides means for effective creation, secure storage and restore of backups inCloud. For data archiving new efficient SGBP file format is being used in the system, which is based on DEFLATE compressionalgorithm. Proposed format provides means for fast archive creation, which can contain significant amounts of data. Modernapproaches of backup archive protection are described in the paper. Also the SGBP format is compared to heavily used ZIP format(both Z...

  16. Production and testing of the ENEA-Bologna VITJEFF32.BOLIB (JEFF-3.2) multi-group (199 n + 42 γ) cross section library in AMPX format for nuclear fission applications

    Science.gov (United States)

    Pescarini, Massimo; Orsi, Roberto; Frisoni, Manuela

    2017-09-01

    The ENEA-Bologna Nuclear Data Group produced the VITJEFF32.BOLIB multi-group coupled neutron/photon (199 n + 42 γ) cross section library in AMPX format, based on the OECD-NEA Data Bank JEFF-3.2 evaluated nuclear data library. VITJEFF32.BOLIB was conceived for nuclear fission applications as European counterpart of the ORNL VITAMIN-B7 similar library (ENDF/B-VII.0 data). VITJEFF32.BOLIB has the same neutron and photon energy group structure as the former ORNL VITAMIN-B6 reference library (ENDF/B-VI.3 data) and was produced using similar data processing methodologies, based on the LANL NJOY-2012.53 nuclear data processing system for the generation of the nuclide cross section data files in GENDF format. Then the ENEA-Bologna 2007 Revision of the ORNL SCAMPI nuclear data processing system was used for the conversion into the AMPX format. VITJEFF32.BOLIB contains processed cross section data files for 190 nuclides, obtained through the Bondarenko (f-factor) method for the treatment of neutron resonance self-shielding and temperature effects. Collapsed working libraries of self-shielded cross sections in FIDO-ANISN format, used by the deterministic transport codes of the ORNL DOORS system, can be generated from VITJEFF32.BOLIB through the cited SCAMPI version. This paper describes the methodology and specifications of the data processing performed and presents some results of the VITJEFF32.BOLIB validation.

  17. Production and testing of the ENEA-Bologna VITJEFF32.BOLIB (JEFF-3.2 multi-group (199 n + 42 γ cross section library in AMPX format for nuclear fission applications

    Directory of Open Access Journals (Sweden)

    Pescarini Massimo

    2017-01-01

    Full Text Available The ENEA-Bologna Nuclear Data Group produced the VITJEFF32.BOLIB multi-group coupled neutron/photon (199 n + 42 γ cross section library in AMPX format, based on the OECD-NEA Data Bank JEFF-3.2 evaluated nuclear data library. VITJEFF32.BOLIB was conceived for nuclear fission applications as European counterpart of the ORNL VITAMIN-B7 similar library (ENDF/B-VII.0 data. VITJEFF32.BOLIB has the same neutron and photon energy group structure as the former ORNL VITAMIN-B6 reference library (ENDF/B-VI.3 data and was produced using similar data processing methodologies, based on the LANL NJOY-2012.53 nuclear data processing system for the generation of the nuclide cross section data files in GENDF format. Then the ENEA-Bologna 2007 Revision of the ORNL SCAMPI nuclear data processing system was used for the conversion into the AMPX format. VITJEFF32.BOLIB contains processed cross section data files for 190 nuclides, obtained through the Bondarenko (f-factor method for the treatment of neutron resonance self-shielding and temperature effects. Collapsed working libraries of self-shielded cross sections in FIDO-ANISN format, used by the deterministic transport codes of the ORNL DOORS system, can be generated from VITJEFF32.BOLIB through the cited SCAMPI version. This paper describes the methodology and specifications of the data processing performed and presents some results of the VITJEFF32.BOLIB validation.

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  20. U-Pb (SHRIMP II) Age of zircons from ash tuffs of the upper vendian Chernyi Kamen formation (Sylvitsa group, Middle Urals)

    International Nuclear Information System (INIS)

    Ronkin, Yu.L.; Grazhdankin, D.V.; Maslov, A.V.; Mizens, G.A.; Matukov, D.I.; Krupenin, M.T.; Petrov, G.A.; Lepikhina, O.P.; Kornilova, A.Yu.

    2006-01-01

    To make more precise the model of correlation of the Middle Urals western slope upper vendian layers with the White Sea remote layers one carried out the SHRIMP-II procedure base U-Pb-dating of the volcanogenic zircons from the ash tuffs and of the volcanogenic zircon enclosing argillites of the Middle Urals Chernyi Kamen formation. The obtained age value of the studied zircons equal to 557+-13 million years is in line with the geological data [ru

  1. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  2. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  3. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  4. INSTITUTIONAL SUPPORT OF SECURITY BUDGET OF UKRAINE

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2016-06-01

    Full Text Available The institutional framework from positions of different conceptual approaches was examined in the article. The attention was paid the problems of institutional support budget security in Ukraine. The institutionalization of budgetary relations and especially the formation system of institutional support was investigated. The author's approach to the nature of institutional support budget security was suggested. Institutional and legal, institutional and organizational, and staffing budget security were characterized. It is concluded that the process of institutional development budget security characterized by unacceptable levels of institutional strain.

  5. DIRAC distributed secure framework

    International Nuclear Information System (INIS)

    Casajus, A; Graciani, R

    2010-01-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  6. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  7. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  8. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  9. Strengthening nuclear security

    International Nuclear Information System (INIS)

    Kurihara, Hiroyoshi

    2003-01-01

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  10. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  11. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  12. Query translation for XPath-based security views

    NARCIS (Netherlands)

    Vercammen, R.; Hidders, A.J.H.; Paredaens, J.; Grust, T.; Hopfner, H.; Illarramendi, A.

    2006-01-01

    Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restricting access to data by certain users. This can, for example, be achieved by means of access rules or XML security views, which

  13. Group play

    DEFF Research Database (Denmark)

    Tychsen, Anders; Hitchens, Michael; Brolund, Thea

    2008-01-01

    Role-playing games (RPGs) are a well-known game form, existing in a number of formats, including tabletop, live action, and various digital forms. Despite their popularity, empirical studies of these games are relatively rare. In particular there have been few examinations of the effects of the v......Role-playing games (RPGs) are a well-known game form, existing in a number of formats, including tabletop, live action, and various digital forms. Despite their popularity, empirical studies of these games are relatively rare. In particular there have been few examinations of the effects...... of the various formats used by RPGs on the gaming experience. This article presents the results of an empirical study, examining how multi-player tabletop RPGs are affected as they are ported to the digital medium. Issues examined include the use of disposition assessments to predict play experience, the effect...... of group dynamics, the influence of the fictional game characters and the comparative play experience between the two formats. The results indicate that group dynamics and the relationship between the players and their digital characters, are integral to the quality of the gaming experience in multiplayer...

  14. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  15. Security Theories of Third World

    Directory of Open Access Journals (Sweden)

    Alexandra Victorovna Khudaykulova

    2016-12-01

    Full Text Available This article analyzes the security studies in the “Third World”. The evolution of the conceptual apparatus in the field of security studies and in the understanding of the “Third World” is given. The author provides us an analysis of the security issues in the so-called “post-colonial” countries in the years of “cold war” and in the post-bipolar period, defines the domain of security for the developing world and the current agenda. Particular attention is paid to the analysis of the security concepts of the late XX century - the “security of the person”, “securitization”, “humanitarian intervention” - which are of particular concern to countries of the “Third World”. An alternative format of the “Third World” in the categories of postmodern, modern and premodern worlds is given, the term of “non-Westphalian” state is used as well. Basic characteristics of the “Third World” in the socio-economic and political spheres are provided. The author emphasizes that the state of security of the “Third World” is fundamentally different from that of the developed Western countries, since most threats in non-Western countries, does not come from the outside, but from within. Accordingly, the non-Western security theory does not focus exclusively on military issues and explore a wide range of issues of civil nature - economic, political, social, environmental and development challenges, as well as poverty and underdevelopment.

  16. Storage of radioactive wastes in geological formations. Technical criteria for site selection. Report by the work-group chaired by Professor Goguel

    International Nuclear Information System (INIS)

    Goguel, Jean; Candes, Pierre; Izabel, Cecile; Autran, Albert; Barthoux, Alain; Baudin, Guy; Devillers, Christian; Habib, Pierre; Lafuma, Jacques; Lefevre, Jean; Peaudecerf, Pierre; Pradel, Jacques; Salle, Claude; Treuil, Michel; Lebrun, Patrick; Tissier, Marie-Solange

    1985-06-01

    This document is the result of a prospective mission on the long term storage of radioactive wastes containing long-period emitters (wastes of B and C categories), and notably on a definitive storage in deep continental geological formations. After a presentation of hypotheses (brief description of the storage concept, main safety principles, objectives in terms of radiological safety, safety options, time-related considerations), the authors addressed the following issues: safety before closing during the exploitation period, and safety after closure (after backfilling and sealing of all underground cavities). For the first issue, they discuss the impacts of works on safety and thermal effects during exploitation. For the second issue, they discuss the site natural hydro-geological context, the disturbances brought by the storage (access of water to the storage, and return of water into the biosphere), and the influence of external factors (geological phenomena, human intrusion). Then, the authors make recommendations regarding reconnaissance programs and studies for the selection and qualification of a site. They finally propose technical criteria and main recommendations for site selection. Appendices propose a list of hearings, a presentation of the storage concept, a report on the impact of works, a report on the presence of mineralisation in granite massifs, reports on radiological consequences of intrusions in salt formations and in granite massif containing storage of radioactive wastes or vitrified wastes, a report on the characterization of unsteady parts of the French continental construction, a presentation of the evolution of climate and icings, and a study of seismic movements in the case of deep storages

  17. In situ formation of adhesive hydrogels based on PL with laterally grafted catechol groups and their bonding efficacy to wet organic substrates.

    Science.gov (United States)

    Ye, Mingming; Jiang, Rui; Zhao, Jin; Zhang, Juntao; Yuan, Xubo; Yuan, Xiaoyan

    2015-12-01

    Adhesives with catechol moieties have been widely investigated in recent years. However, actually how much catechol groups for these mussel bio-inspired adhesives, especially in their natural form under physiological condition, is appropriate to bond with organic substrates has not been studied intensively. This study blends ε-polylysine (PL), featuring laterally grafted catechols under physiological conditions (pH 7.4), with oxidized dextran to form a hydrogel in situ via the Schiff base without introducing small cytotoxic molecules as crosslinking agents. It finds that the amount of catechol groups imposes an obvious influence on gelation time, swelling behavior, and hydrogel morphology. Both the storage modulus and adhesion strength are found to increase first and decrease afterwards with an increase of pendent catechol content. Furthermore, catechol hydrogen interactions and the decrease in the crosslink density derived from the decrease of amino groups on PL are simultaneously found to affect the storage modulus. Meanwhile, multiple hydrogen-bonding interactions of catechol with amino, hydroxyl, and carboxyl groups, which are in abundance on the surface of tissue, are mainly found to provide an adhesive force. The study finds that with more catechol, there is a greater chance that the cohesive force will weaken, making the entire adhesion strength of the hydrogel decrease. Using a cytotoxicity test, the nontoxicity of the hydrogel towards the growth of L929 cells is proven, indicating that hydrogels have potential applications in soft tissue repair under natural physiological conditions.

  18. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  19. Conseptual framework of ensuring food security in the Ural federal district

    Directory of Open Access Journals (Sweden)

    Aleksandr Samvelovich Beletskiy

    2011-12-01

    Full Text Available The paper reviews the risks and threats to food security of the Ural Federal District which can significantly reduce its the level. The most significant risks are grouped according to the following classification: macroeconomic, technological, climatic, agro-ecological and foreign trade risks. The main directions of economic policy of the Ural Federal District in the area of food security are defined. Particular attention is paid to the improvement of economic and physical availability of food for all groups of population and to the problems of formation of the state material reserves and food safety. Strategic development priorities in the field of agricultural and fishery products, raw materials and food, sustainable development of rural areas in the field of foreign policy are formulated. Conceptual bases for the implementation mechanism of economic policies to ensure food security in the region are suggested.

  20. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  1. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  2. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  3. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  4. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  5. Virtual Focus Groups: New Frontiers in Research

    Directory of Open Access Journals (Sweden)

    Lyn Turney

    2005-06-01

    Full Text Available New information and communication technologies in the form of learning management systems provide unique and inventive opportunities for qualitative researchers. Their intrinsic ability to record discursive data in text format accurately and to provide safe, secure, and anonymous environments for participants makes them amenable for use as advanced research tools. In this article, the authors report on a collaborative project that tested the potential of online discussion boards for use in virtual focus groups. What the researchers found was that not only was the method theoretically sound, it actually enhanced their ability to connect with difficult-to-access populations that were disparately spread.

  6. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  7. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  8. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  9. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  12. Decomposition of group-velocity-locked-vector-dissipative solitons and formation of the high-order soliton structure by the product of their recombination.

    Science.gov (United States)

    Wang, Xuan; Li, Lei; Geng, Ying; Wang, Hanxiao; Su, Lei; Zhao, Luming

    2018-02-01

    By using a polarization manipulation and projection system, we numerically decomposed the group-velocity-locked-vector-dissipative solitons (GVLVDSs) from a normal dispersion fiber laser and studied the combination of the projections of the phase-modulated components of the GVLVDS through a polarization beam splitter. Pulses with a structure similar to a high-order vector soliton could be obtained, which could be considered as a pseudo-high-order GVLVDS. It is found that, although GVLVDSs are intrinsically different from group-velocity-locked-vector solitons generated in fiber lasers operated in the anomalous dispersion regime, similar characteristics for the generation of pseudo-high-order GVLVDS are obtained. However, pulse chirp plays a significant role on the generation of pseudo-high-order GVLVDS.

  13. INMM Physical Protection Technical Working Group Workshops

    International Nuclear Information System (INIS)

    Williams, J.D.

    1982-01-01

    The Institute of Nuclear Materials Management (INMM) established the Physical Protection Technical Working Group to be a focal point for INMM activities related to the physical protection of nuclear materials and facilities. The Technical Working Group has sponsored workshops with major emphasis on intrusion detection systems, entry control systems, and security personnel training. The format for these workshops has consisted of a series of small informal group discussions on specific subject matter which allows direct participation by the attendees and the exchange of ideas, experiences, and insights. This paper will introduce the reader to the activities of the Physical Protection Technical Working Group, to identify the workshops which have been held, and to serve as an introduction to the following three papers of this session

  14. Atomic geometry and STM simulations of a TiO.sub.2./sub.(110) surface upon formation of an oxygen vacancy and hydroxyl group

    Czech Academy of Sciences Publication Activity Database

    Mutombo, Pingo; Kiss, A.M.; Berkó, A.; Cháb, Vladimír

    2008-01-01

    Roč. 16, - (2008), 025007/1-025007/9 ISSN 0965-0393 R&D Projects: GA AV ČR IAA1010413 Grant - others:MŠMT(CZ) 9/2004 KONTAKT Institutional research plan: CEZ:AV0Z10100521 Source of funding: V - iné verejné zdroje Keywords : vacance * Oxygen * OH group * STM Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 1.388, year: 2008

  15. The "Molecular and cell Biology" program of the Presidium of the Russian Academyof sciences as an effective format for the support of promising scientific research groups

    OpenAIRE

    Sychev, V.

    2010-01-01

    There are various ways to finance science in Russia, both governmental and private. Financial support can range from tens of thousands of rubles up to several million in stipends and grants. One of the questions most often addressed to the heads of agencies or funds is about the level of transparency and objectivity when selecting groups which receive financial support. Few well-known financing organizations have avoided criticism regarding this issue. Nevertheless, there is one scientific fi...

  16. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  17. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  18. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  19. Development of Innovative Component for the Region’s Economic Security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2017-12-01

    Full Text Available This article studies the development of innovative component for the region’s economic security. The hypothesis of the study is that in the context of globalization and development of network society, innovation is becoming one of the key elements ensuring the economic security of a region. We considered the relationship between the concepts of sustainable development and economic security. The authors show that currently, the economic security of the country directly depends on its place within the innovation chain. We substantiate that Russian Federation and its regions need to shift to the innovation development based on strengthening its own sources for long-term growth. The paper considers the basic theoretical and methodological problems in the formation of innovation component of the Russian regions’ economic security. We reveal the major essence and elements of the innovative component of the sustainable economic development of the region. The authors show that the formation of the innovative component of the region’s economic security demands the correlation of the strategy of regional innovation development and the production and technological type of territory. Additionally, this strategy should correlate with the desirable ways of production type transformation in the future, considering the trends of the world economy. We have highlighted the production and technological types of Russian regions as well as identified the features of relevant regional components for the innovation system of the Russian Federation to ensure sustainable development. The study defines the priority directions and goals for the development of economic security innovative component in the Russian regions. The authors’ calculations allowed to select a group of territorial subjects of the Russian Federation, which appear to be the most promising for the development of innovative activities for the elaboration of export-oriented high-tech industries

  20. Petroleum systems and geologic assessment of undiscovered oil and gas, Cotton Valley group and Travis Peak-Hosston formations, East Texas basin and Louisiana-Mississippi salt basins provinces of the northern Gulf Coast region. Chapters 1-7.

    Science.gov (United States)

    ,

    2006-01-01

    The purpose of the U.S. Geological Survey's (USGS) National Oil and Gas Assessment is to develop geologically based hypotheses regarding the potential for additions to oil and gas reserves in priority areas of the United States. The USGS recently completed an assessment of undiscovered oil and gas potential of the Cotton Valley Group and Travis Peak and Hosston Formations in the East Texas Basin and Louisiana-Mississippi Salt Basins Provinces in the Gulf Coast Region (USGS Provinces 5048 and 5049). The Cotton Valley Group and Travis Peak and Hosston Formations are important because of their potential for natural gas resources. This assessment is based on geologic principles and uses the total petroleum system concept. The geologic elements of a total petroleum system include hydrocarbon source rocks (source rock maturation, hydrocarbon generation and migration), reservoir rocks (sequence stratigraphy and petrophysical properties), and hydrocarbon traps (trap formation and timing). The USGS used this geologic framework to define one total petroleum system and eight assessment units. Seven assessment units were quantitatively assessed for undiscovered oil and gas resources.

  1. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  2. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  3. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  4. The Economic Security of Bank: Theoretical Basis and Systemic Approach

    Directory of Open Access Journals (Sweden)

    Gavlovska Nataliia I.

    2017-07-01

    Full Text Available The article analyzes the existing approaches to interpreting the category of «economic security of bank». A author’s own definition of the concept of «economic security of bank» has been proposed, which should be understood as condition of protecting the vital interests of bank, achieved by harmonizing relationships with the entities of external influence and optimizing the internal system processes, thus enabling efficient function as well as development by means of an adaptation mechanism. A number of approaches to understanding the substance of the above concept has been allocated and their main characteristics have been provided. The need to study the specifics of interaction of banking institutions with the external environment in the context of interaction between the State agents and market actors has been underlined. Features of formation of the term of «system» have been defined, three main groups of approaches to interpretation of the term have been provided. A author’s own definition of the concept of «economic security system of bank» has been proposed. A concrete definition of principles for building an economic security system of bank has been provided.

  5. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    OpenAIRE

    Elena Vladimirovna Batueva

    2014-01-01

    The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is sh...

  6. Conducting an information security audit

    Directory of Open Access Journals (Sweden)

    Prof. Ph.D . Gheorghe Popescu

    2008-05-01

    Full Text Available The rapid and dramatic advances in information technology (IT in recent years have withoutquestion generated tremendous benefits. At the same time, information technology has created significant,nunprecedented risks to government and to entities operations. So, computer security has become muchmore important as all levels of government and entities utilize information systems security measures toavoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitiveinformation. Obviously, uses of computer security become essential in minimizing the risk of malicious attacksfrom individuals and groups, considering that there are many current computer systems with onlylimited security precautions in place.As we already know financial audits are the most common examinations that a business manager en-counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical securityaudits. However, they are unlikely to be acquainted with information security audits; that is an audit ofhow the confidentiality, availability and integrity of an organization’s information are assured. Any way,if not, they should be, especially that an information security audit is one of the best ways to determine thesecurity of an organization’s information without incurring the cost and other associated damages of a securityincident.

  7. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  8. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  9. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  10. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  11. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  12. Group dynamics.

    Science.gov (United States)

    Scandiffio, A L

    1990-12-01

    Group dynamics play a significant role within any organization, culture, or unit. The important thing to remember with any of these structures is that they are made up of people--people with different ideas, motivations, background, and sometimes different agendas. Most groups, formal or informal, look for a leader in an effort to maintain cohesiveness of the unit. At times, that cultural bond must be developed; once developed, it must be nurtured. There are also times that one of the group no longer finds the culture comfortable and begins to act out behaviorally. It is these times that become trying for the leader as she or he attempts to remain objective when that which was once in the building phase of group cohesiveness starts to fall apart. At all times, the manager must continue to view the employee creating the disturbance as an integral part of the group. It is at this time that it is beneficial to perceive the employee exhibiting problem behaviors as a special employee, as one who needs the benefit of your experience and skills, as one who is still part of the group. It is also during this time that the manager should focus upon her or his own views in the area of power, communication, and the corporate culture of the unit that one has established before attempting to understand another's point of view. Once we understand our own motivation and accept ourselves, it is then that we may move on to offer assistance to another. Once we understand our insecurities recognizing staff dysfunction as a symptom of system dysfunction will not be so threatening to the concept of the manager that we perceive ourselves to be. It takes a secure person to admit that she or he favors staff before deciding to do something to change things. The important thing to know is that it can be done. The favored staff can find a new way of relating to others, the special employee can find new modes of behavior (and even find self-esteem in the process), the group can find new ways

  13. Surface plasmon resonance analysis shows an IgG-isotype-specific defect in ABO blood group antibody formation in patients with common variable immunodeficiency

    Directory of Open Access Journals (Sweden)

    Michael Bernhard Fischer

    2015-05-01

    Full Text Available Background: Common variable immunodeficiency (CVID is the most common clinically severe primary immunodeficiency and comprises a heterogeneous group of patients with recurrent severe bacterial infections due to the failure to produce IgG antibodies after exposure to infectious agents and immunization. Diagnostic recommendations for antibody failure include assessment of isoagglutinins. We have readdressed this four decades old but still accepted recommendation with up to date methodology.Methods: Anti-A/B IgM- and IgG-antibodies were measured by Diamed-ID Micro Typing, surface plasmon resonance (SPR using the Biacore® device and flow cytometry.Results: When Diamed-ID Micro Typing was used, CVID patients (n=34 showed IgG- and IgM-isoagglutinins that were comparable to healthy volunteers (n=28, while all XLA patients (n=8 had none. Anti-A/B IgM-antibodies were present in more than 2/3 of the CVID patients and showed binding kinetics comparable to anti-A/B IgM-antibodies from healthy individuals. A correlation could be found in CVID patients between levels of anti-A/B IgM-antibodies and levels of serum IgM and PnP-IgM-antibodies. In contrast in CVID patients as a group ABO antibodies were significantly decreased when assessed by SPR, which correlated with levels of switched memory, non-switched memory and naïve B cells, but all CVID patients had low/undetectable anti-A/B IgG-antibodies.Conclusion: These results indicate that conventional isoagglutinin assessment and assessment of anti-A/B IgM antibodies are not suited for the diagnosis of impaired antibody production in CVID. Examination of anti-A/B IgG antibodies by SPR provides a useful method for the diagnosis of IgG antibody failure in all CVID patients studied, thus indicating an important additional rationale to start immunoglobulin replacement therapy early in these patients, before post-infectious sequelae develop.

  14. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  15. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  16. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  17. High-Mobility Group Box 1 Mediates Fibroblast Activity via RAGE-MAPK and NF-κB Signaling in Keloid Scar Formation

    Directory of Open Access Journals (Sweden)

    Jihee Kim

    2017-12-01

    Full Text Available Emerging studies have revealed the involvement of high-mobility group box 1 (HMGB1 in systemic fibrotic diseases, yet its role in the cutaneous scarring process has not yet been investigated. We hypothesized that HMGB1 may promote fibroblast activity to cause abnormal cutaneous scarring. In vitro wound healing assay with normal and keloid fibroblasts demonstrated that HMGB1 administration promoted the migration of both fibroblasts with increased speed and a greater traveling distance. Treatment of the HMGB1 inhibitor glycyrrhizic acid (GA showed an opposing effect on both activities. To analyze the downstream mechanism, the protein levels of extracellular signal-regulated kinase (ERK 1/2, protein kinase B (AKT, and nuclear factor kappa-light-chain-enhancer of activated B cells (NF-κB were measured by western blot analysis. HMGB1 increased the expression levels of ERK1/2, AKT, and NF-κB compared to the control, which was suppressed by GA. HMGB1 promoted both normal and keloid fibroblasts migration to a degree equivalent to that achieved with TGF-β. We concluded that HMGB1 activates fibroblasts via the receptor for advanced glycation end product (RAGE—mitogen-activated protein kinases (MAPK and NF-κB interaction signaling pathways. Further knowledge of the relationship of HMGB1 with skin fibrosis may lead to a promising clinical approach to manage abnormal scarring.

  18. High-Mobility Group Box 1 Mediates Fibroblast Activity via RAGE-MAPK and NF-κB Signaling in Keloid Scar Formation.

    Science.gov (United States)

    Kim, Jihee; Park, Jong-Chul; Lee, Mi Hee; Yang, Chae Eun; Lee, Ju Hee; Lee, Won Jai

    2017-12-28

    Emerging studies have revealed the involvement of high-mobility group box 1 (HMGB1) in systemic fibrotic diseases, yet its role in the cutaneous scarring process has not yet been investigated. We hypothesized that HMGB1 may promote fibroblast activity to cause abnormal cutaneous scarring. In vitro wound healing assay with normal and keloid fibroblasts demonstrated that HMGB1 administration promoted the migration of both fibroblasts with increased speed and a greater traveling distance. Treatment of the HMGB1 inhibitor glycyrrhizic acid (GA) showed an opposing effect on both activities. To analyze the downstream mechanism, the protein levels of extracellular signal-regulated kinase (ERK) 1/2, protein kinase B (AKT), and nuclear factor kappa-light-chain-enhancer of activated B cells (NF-κB) were measured by western blot analysis. HMGB1 increased the expression levels of ERK1/2, AKT, and NF-κB compared to the control, which was suppressed by GA. HMGB1 promoted both normal and keloid fibroblasts migration to a degree equivalent to that achieved with TGF-β. We concluded that HMGB1 activates fibroblasts via the receptor for advanced glycation end product (RAGE)-mitogen-activated protein kinases (MAPK) and NF-κB interaction signaling pathways. Further knowledge of the relationship of HMGB1 with skin fibrosis may lead to a promising clinical approach to manage abnormal scarring.

  19. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  20. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  1. Facilitating organisational development using a group-based formative assessment and benchmarking method: design and implementation of the International Family Practice Maturity Matrix.

    Science.gov (United States)

    Elwyn, Glyn; Bekkers, Marie-Jet; Tapp, Laura; Edwards, Adrian; Newcombe, Robert; Eriksson, Tina; Braspenning, Jozé; Kuch, Christine; Adzic, Zlata Ozvacic; Ayankogbe, Olayinka; Cvetko, Tatjana; In 't Veld, Kees; Karotsis, Antonis; Kersnik, Janko; Lefebvre, Luc; Mecini, Ilir; Petricek, Goranka; Pisco, Luis; Thesen, Janecke; Turón, José María; van Rossen, Edward; Grol, Richard

    2010-12-01

    Well-organised practices deliver higher-quality care. Yet there has been very little effort so far to help primary care organisations achieve higher levels of team performance and to help them identify and prioritise areas where quality improvement efforts should be concentrated. No attempt at all has been made to achieve a method which would be capable of providing comparisons--and the stimulus for further improvement--at an international level. The development of the International Family Practice Maturity Matrix took place in three phases: (1) selection and refinement of organisational dimensions; (2) development of incremental scales based on a recognised theoretical framework; and (3) testing the feasibility of the approach on an international basis, including generation of an automated web-based benchmarking system. This work has demonstrated the feasibility of developing an organisational assessment tool for primary care organisations that is sufficiently generic to cross international borders and is applicable across a diverse range of health settings, from state-organised systems to insurer-based health economies. It proved possible to introduce this assessment method in 11 countries in Europe and one in Africa, and to generate comparison benchmarks based on the data collected. The evaluation of the assessment process was uniformly positive with the view that the approach efficiently enables the identification of priorities for organisational development and quality improvement at the same time as motivating change by virtue of the group dynamics. We are not aware of any other organisational assessment method for primary care which has been 'born international,' and that has involved attention to theory, dimension selection and item refinement. The principal aims were to achieve an organisational assessment which gains added value by using interaction, engagement comparative benchmarks: aims which have been achieved. The next step is to achieve wider

  2. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  3. Fourth Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Zielstra, A.

    2010-01-01

    On December 1st, 2009, the fourth Dutch Process Control Security Event took place in Baarn, The Netherlands. The security event with the title ‘Manage IT!’ was organised by the Dutch National Infrastructure against Cybercrime (NICC). Mid of November, a group of over thirty people participated in the

  4. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  5. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  6. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  7. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  8. Paleoproterozoic source contributions to the Sao Roque Group sedimentation: LA-MC-ICPMS U-Pb dating and Sm-Nd systematics of clasts from metaconglomerates of the Boturuna Formation

    Energy Technology Data Exchange (ETDEWEB)

    Henrique-Pinto, Renato; Janasi, Valdecir de Assis; Tassinari, Colombo Celso Gaeta [Universidade de Sao Paulo (USP), SP (Brazil). Inst. de Geociencias. Dept. de Mineralogia e Geotectonica; Simonetti, Antonio [University of Notre Dame, South Bend (United States). Dept. of Civil Engineering and Geological Sciences; Heaman, Larry Michael, E-mail: renatohp@usp.br, E-mail: vajanasi@usp.br, E-mail: ccgtassi@usp.br, E-mail: antonio.simonetti.3@nd.edu, E-mail: larry.heaman@ualberta.ca [University of Alberta, Edmonton (Canada). Dept. of Earth and Atmospheric Sciences

    2012-12-15

    The Sao Roque Group is characterized by volcano-sedimentary sequences, in which deposition probably started in the late Paleoproterozoic. U-Pb dating by LA-MC-ICPMS of zircons extracted from predominantly equigranular monzogranites clasts from Morro Doce and Morro do Polvilho regions, yield paleoproterozoic ages of 2199 {+-}8.5 Ma and 2247 {+-}13 Ma, respectively. These represent the ages for the main source of granite for the metaconglomerates from the Boturuna Formation (basal unit of Sao Roque Group). Its polycyclic history is reinforced by the presence of inherited Archean zircons (2694 {+-}29 Ma) found within the clasts. Moreover, these clasts have also been affected by the Neoproterozoic overprinting event as indicated by their lower intercept Concordia ages. Sm-Nd isotope data for the main clast varieties from the Morro Doce metaconglomerates yield T{sub DM} ages of 2.6 to 2.7 Ga, demonstrating that these granites are the recycling products of an Archean crustal component. The metaconglomerate arkosean framework yields slightly lower {epsilon}{sub Nd(t)} values than those for the clasts, indicating that a younger and/or more primitive source also contributed to the Boturuna Formation. (author)

  9. U-Pb, Pb-Pb, and K-Ar isotopic study and petrography of uraniferous phosphate-bearing rocks in the Thelon Formation, Dubawnt Group, Northwest Territories, Canada

    International Nuclear Information System (INIS)

    Miller, A.R.; Cumming, G.L.; Krstic, D.

    1989-01-01

    The Thelon Formation, uppermost unit of the Dubawnt Group, overlies a regionally extensive paleoweathered zone developed on a wide range of lithochronological units including formations in the lower Dubawnt Group. Authigenic uraniferous phosphate minerals, fluorapatite and goyazite, cementing Thelon conglomerate - sandstone and filling fractures in the underlying paleoweathered zone, were dated in an attempt to better constrain the age of Thelon sedimentation and diagenesis. The oldest age, 1720 ± 6 Ma, derived from phosphate-cemented sediments, is interpreted as a minimum age for diagenesis and therefore brackets initial Thelon sedimentation between emplacement of fluorite-bearing granites at 1753 Ma and authigenic phosphate cementation at 1720 Ma. Additional ages of 1685 ± 4 and 1647 Ma are interpreted as remobilization or subsequent cementation events. K-Ar ages on illite, 1386 ± 37 and 1266 ± 31 Ma, from the paleoweathered zone and basal conglomerate, respectively, are significantly younger than ages derived from coexisting phosphate. These K-Ar ages recorded hydrothermal events that may be related to processes associated with unconformity-type uranium mineralization at approximately 1400-1300 Ma. Ages from the Thelon Basin permit geochronologic correlations with the Athabasca and Hornby basins, long correlated on the basis of similarities in sedimentation, stratigraphy, and tectonic setting

  10. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  11. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  12. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  13. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  14. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  15. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  16. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  17. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  18. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  19. Overview of the NEA/OECD Seabed Working Group. An international programme for assessment of the feasibility of disposal of high-level waste in geological formations beneath the ocean

    International Nuclear Information System (INIS)

    Anderson, D.R.; Boyer, D.G.; Rueegger, B.; Olivier, J.P.

    1984-01-01

    The NEA/OECD Seabed Working Group, a subcommittee of the Radioactive Waste Management Committee (whose present membership includes Canada, the CEC, the Federal Republic of Germany, France, Japan, the Netherlands, the United Kingdom and the USA), is addressing the questions of how best to utilize the resources of the ocean. Since the beginning of time, the oceans have been the 'garbage dumps' of the land masses. Erosional processes continuously tear down mountains and the land and move them into the oceans. Most of the elements in nuclear waste are chemically identical to those being eroded, cycled and deposited in the ocean. Could the ocean's geological formations be used for the disposal of these radioactive wastes. The Seabed Working Group is divided into eight task groups: System Analysis, Site Selection, Sediment and Rock, Engineering Studies, Biology, Physical Oceanography, Waste Form and Canister, and Institutional. Within each of the groups a set of predictive models is being developed, the appropriate properties acquired, and predictions made. Laboratory and in-situ field tests will be conducted to verify the accuracy of the model predictions. The model sections will then be combined into a systems model to yield an estimate of the feasibility, risk and cost of this waste disposal option. The results to date of the technical and environmental feasibility studies of seabed disposal appear to be leading to a conclusion that this is technically feasible. Institutional feasibility is just beginning to be considered. (author)

  20. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  1. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  2. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  3. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  4. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  5. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  6. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  7. Methods of Organizational Information Security

    Science.gov (United States)

    Martins, José; Dos Santos, Henrique

    The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.

  8. Comparative analysis of the calcretization process in the Marilia formations (Bauru group - Brasil) and Mercedes ( Paysandu group - Uruguay), Upper Cretaceous of the Parana basin; Analisis comparativo de los procesos de calcretizacion en las Formaciones Marilia (Grupo Bauru-Brasil) y Mercedes (Grupo Paysandu-Uruguay), Cretacico Superior de la cuenca de Parana

    Energy Technology Data Exchange (ETDEWEB)

    Veroslavsky, G; Etchebehere, M; Sad, A; Fulfaro, J

    1998-07-01

    Pedogenic and non-pedogenic calcrete facies are very common feature of Marilia (Brazil) and Mercedes (Uruguay) formations in the Parana Basin. The non-pedogenic ones constitute massive limestone facies that have been recently interpreted as groundwater calcretes. These limestones are exploited in both countries to supply raw materials to Portland cement and soil conditioner in origin and age of calcretization phenomena. In Uruguay, the calcretization process seens to be band formation. Field relationships and fossil assemblage point to a Paleocene (or later) age for the calcretization. In Brazilian territory, the groundwater calcretes aresupposed to be of Upper Cretaceous age due to the presence of dinosaurs scattered through the Bauru Group, including siliciclastic beds below and above the calcretes. The authors assume that calcretization processes are similar in both countries (host rocks, intensity, size, textures, geometries and economic potential). The main difference is in age of the calcretization. (author)

  9. On Peer Networks and Group Formation

    OpenAIRE

    Ballester Pla, Coralio

    2005-01-01

    Consultable des del TDX Títol obtingut de la portada digitalitzada En el artículo «NP-completeness in Hedonic Games», identificamos algunas limitaciones significativas de los modelos estándar de juegos cooperativos: A menudo, es imposible alcanzar una organización estable de una sociedad en una cantidad de tiempo razonable. Las implicaciones básicas de estos resultados son las siguientes, Primero, desde un punto de vista positivo, las sociedades están «condenadas» a evolucionar constant...

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  12. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  14. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  15. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  17. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  18. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  19. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  20. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  1. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  2. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  3. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  5. A METHODOLOGICAL APPROACH TO THE STRATEGIC ANALYSIS OF FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Anastasiia Mostova

    2017-12-01

    Full Text Available The objective of present work is to substantiate the use of tools for strategic analysis in order to develop a strategy for the country’s food security under current conditions and to devise the author’s original technique to perform strategic analysis of food security using a SWOT-analysis. The methodology of the study. The article substantiates the need for strategic planning of food security. The author considers stages in strategic planning and explains the importance of the stage of strategic analysis of the country’s food security. It is proposed to apply a SWOT-analysis when running a strategic analysis of food security. The study is based on the system of indicators and characteristics of the country’s economy, agricultural sector, market trends, material-technical, financial, human resources, which are essential to obtain an objective assessment of the impact of trends and factors on food security, and in order to further develop the procedure for conducting a strategic analysis of the country’s food security. Results of the study. The procedure for strategic analysis of food security is developed based on the tool of a SWOT-analysis, which implies three stages: a strategic analysis of weaknesses and strengths, opportunities and threats; construction of the matrix of weaknesses and strengths, opportunities, and threats (SWOT-analysis matrix; formation of the food security strategy based on the SWOT-analysis matrix. A list of characteristics was compiled in order to conduct a strategic analysis of food security and to categorize them as strengths or weaknesses, threats, and opportunities. The characteristics are systemized into strategic groups: production, market; resources; consumption: this is necessary for the objective establishing of strategic directions, responsible performers, allocation of resources, and effective control, for the purpose of further development and implementation of the strategy. A strategic analysis

  6. The Pan-STARRS1 medium-deep survey: The role of galaxy group environment in the star formation rate versus stellar mass relation and quiescent fraction out to z ∼ 0.8

    International Nuclear Information System (INIS)

    Lin, Lihwai; Chen, Chin-Wei; Coupon, Jean; Hsieh, Bau-Ching; Jian, Hung-Yu; Foucaud, Sebastien; Norberg, Peder; Bower, R. G.; Cole, Shaun; Arnalte-Mur, Pablo; Draper, P.; Heinis, Sebastien; Phleps, Stefanie; Chen, Wen-Ping; Lee, Chien-Hsiu; Burgett, William; Chambers, K. C.; Denneau, L.; Flewelling, H.; Hodapp, K. W.

    2014-01-01

    Using a large optically selected sample of field and group galaxies drawn from the Pan-STARRS1 Medium-Deep Survey (PS1/MDS), we present a detailed analysis of the specific star formation rate (SSFR)—stellar mass (M * ) relation, as well as the quiescent fraction versus M * relation in different environments. While both the SSFR and the quiescent fraction depend strongly on stellar mass, the environment also plays an important role. Using this large galaxy sample, we confirm that the fraction of quiescent galaxies is strongly dependent on environment at a fixed stellar mass, but that the amplitude and the slope of the star-forming sequence is similar between the field and groups: in other words, the SSFR-density relation at a fixed stellar mass is primarily driven by the change in the star-forming and quiescent fractions between different environments rather than a global suppression in the star formation rate for the star-forming population. However, when we restrict our sample to the cluster-scale environments (M > 10 14 M ☉ ), we find a global reduction in the SSFR of the star-forming sequence of 17% at 4σ confidence as opposed to its field counterpart. After removing the stellar mass dependence of the quiescent fraction seen in field galaxies, the excess in the quiescent fraction due to the environment quenching in groups and clusters is found to increase with stellar mass, although deeper and larger data from the full PS1/MDS will be required to draw firm conclusions. We argue that these results are in favor of galaxy mergers to be the primary environment quenching mechanism operating in galaxy groups whereas strangulation is able to reproduce the observed trend in the environment quenching efficiency and stellar mass relation seen in clusters. Our results also suggest that the relative importance between mass quenching and environment quenching depends on stellar mass—the mass quenching plays a dominant role in producing quiescent galaxies for more

  7. The Pan-STARRS1 medium-deep survey: The role of galaxy group environment in the star formation rate versus stellar mass relation and quiescent fraction out to z ∼ 0.8

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Lihwai; Chen, Chin-Wei; Coupon, Jean; Hsieh, Bau-Ching [Institute of Astronomy and Astrophysics, Academia Sinica, Taipei 106, Taiwan, R.O.C. (China); Jian, Hung-Yu [Department of Physics, National Taiwan University, Taipei 106, Taiwan, R.O.C. (China); Foucaud, Sebastien [Department of Earth Sciences, National Taiwan Normal University, N°88, Tingzhou Road, Sec. 4, Taipei 11677, Taiwan, R.O.C. (China); Norberg, Peder; Bower, R. G.; Cole, Shaun; Arnalte-Mur, Pablo; Draper, P. [Institute for Computational Cosmology, Department of Physics, Durham University, South Road, Durham DH1 3LE (United Kingdom); Heinis, Sebastien [Department of Astronomy, University of Maryland, MD 20742 (United States); Phleps, Stefanie [Max-Planck-Institut für Extraterrestrische Physik, Giessenbachstraße, D-85748 Garching (Germany); Chen, Wen-Ping [Graduate Institute of Astronomy, National Central University, Chung-Li 32054, Taiwan, R.O.C. (China); Lee, Chien-Hsiu [University Observatory Munich, Scheinerstrasse 1, D-81679 Munich (Germany); Burgett, William; Chambers, K. C.; Denneau, L.; Flewelling, H.; Hodapp, K. W., E-mail: lihwailin@asiaa.sinica.edu.tw [Institute for Astronomy, University of Hawaii, 2680 Woodlawn Drive, Honolulu, HI 96822 (United States); and others

    2014-02-10

    Using a large optically selected sample of field and group galaxies drawn from the Pan-STARRS1 Medium-Deep Survey (PS1/MDS), we present a detailed analysis of the specific star formation rate (SSFR)—stellar mass (M {sub *}) relation, as well as the quiescent fraction versus M {sub *} relation in different environments. While both the SSFR and the quiescent fraction depend strongly on stellar mass, the environment also plays an important role. Using this large galaxy sample, we confirm that the fraction of quiescent galaxies is strongly dependent on environment at a fixed stellar mass, but that the amplitude and the slope of the star-forming sequence is similar between the field and groups: in other words, the SSFR-density relation at a fixed stellar mass is primarily driven by the change in the star-forming and quiescent fractions between different environments rather than a global suppression in the star formation rate for the star-forming population. However, when we restrict our sample to the cluster-scale environments (M > 10{sup 14} M {sub ☉}), we find a global reduction in the SSFR of the star-forming sequence of 17% at 4σ confidence as opposed to its field counterpart. After removing the stellar mass dependence of the quiescent fraction seen in field galaxies, the excess in the quiescent fraction due to the environment quenching in groups and clusters is found to increase with stellar mass, although deeper and larger data from the full PS1/MDS will be required to draw firm conclusions. We argue that these results are in favor of galaxy mergers to be the primary environment quenching mechanism operating in galaxy groups whereas strangulation is able to reproduce the observed trend in the environment quenching efficiency and stellar mass relation seen in clusters. Our results also suggest that the relative importance between mass quenching and environment quenching depends on stellar mass—the mass quenching plays a dominant role in producing quiescent

  8. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  9. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  10. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  11. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  12. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  13. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  14. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  15. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  16. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  17. Internal Security Crisis in Nigeria: Causes, Types, Effects and ...

    African Journals Online (AJOL)

    Since the extinction of security crisis seems impossible, all the society needs is a mechanism for security crisis management and control. Security crisis is inevitable because it can originate in individual and group reactions to situations of scarce recourses, to division of function within society and differentiation of power and ...

  18. The Jurassic of Denmark and Greenland: Palynostratigraphy and palaeoenvironments of the Rævekløft, Gule Horn and Ostreaelv Formations (Lower–Middle Jurassic, Neill Klinter Group, Jameson Land, East Greenland

    Directory of Open Access Journals (Sweden)

    Koppelhus, Eva B.

    2003-10-01

    Full Text Available The Neill Klinter Group of Jameson Land, East Greenland contains rich and diverse palynomorph assemblages. Spores, pollen and freshwater algae dominate most of the samples, but dinoflagellatecysts and acritarchs also form important components. The ages suggested by the palynomorphs from the Rævekløft, Gule Horn and Ostreaelv Formations span the period from the Early Pliensbachian to the early Aalenian. The number of palynomorphs identified totals 136,including 83 miospore and 53 microplankton species; they are grouped into seven palynological assemblage zones.In general, there is good agreement between the palynological and sedimentological data, and the palynological data has refined the understanding of the depositional palaeoenvironments ofthe Neill Klinter Group. In some cases, the boundaries of the palynological assemblage zones are congruent with major sequence stratigraphic surfaces and the palynological data thus supportthe sequence stratigraphic interpretation. In other cases, however, regional correlation indicates that the zone boundaries cross important sequence stratigraphic surfaces, such as sequenceboundaries; such behaviour is thought to reflect the facies-dependent nature of certain of the palynological assemblage zones. The pattern of palynological events in East Greenland has alsobeen recognised on the mid-Norwegian shelf.

  19. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  20. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  1. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  2. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  3. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  4. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  5. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  6. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  7. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  8. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  9. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  10. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  11. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  14. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  15. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  16. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  17. INFORMATION SECURITY IN MOBILE MODULAR MEASURING SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. N. Tkhishev

    2017-01-01

    Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.

  18. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  19. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  20. Stellar formation

    CERN Document Server

    Reddish, V C

    1978-01-01

    Stellar Formation brings together knowledge about the formation of stars. In seeking to determine the conditions necessary for star formation, this book examines questions such as how, where, and why stars form, and at what rate and with what properties. This text also considers whether the formation of a star is an accident or an integral part of the physical properties of matter. This book consists of 13 chapters divided into two sections and begins with an overview of theories that explain star formation as well as the state of knowledge of star formation in comparison to stellar structure