WorldWideScience

Sample records for secure transportable autonomous

  1. Autonomic computing meets SCADA security

    OpenAIRE

    Nazir, S; Patel, S; Patel, D

    2017-01-01

    © 2017 IEEE. National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the auton...

  2. STAR: The Secure Transportable Autonomous Reactor System - Encapsulated Fission Heat Source

    International Nuclear Information System (INIS)

    Ehud Greenspan

    2003-01-01

    OAK-B135 The Encapsulated Nuclear Heat Source (ENHS) is a novel 125 MWth fast spectrum reactor concept that was selected by the 1999 DOE NERI program as a candidate ''Generation-IV'' reactor. It uses Pb-Bi or other liquid-metal coolant and is intended to be factory manufactured in large numbers to be economically competitive. It is anticipated to be most useful to developing countries. The US team studying the feasibility of the ENHS reactor concept consisted of the University of California, Berkeley, Argonne National Laboratory (ANL), Lawrence Livermore National Laboratory (LLNL) and Westinghouse. Collaborating with the US team were three Korean organizations: Korean Atomic Energy Research Institute (KAERI), Korean Advanced Institute for Science and Technology (KAIST) and the University of Seoul, as well as the Central Research Institute of the Electrical Power Industry (CRIEPI) of Japan. Unique features of the ENHS include at least 20 years of operation without refueling; no fuel handling in the host country; no pumps and valves; excess reactivity does not exceed 1$; fully passive removal of the decay heat; very small probability of core damaging accidents; autonomous operation and capability of load-following over a wide range; very long plant life. In addition it offers a close match between demand and supply, large tolerance to human errors, is likely to get public acceptance via demonstration of superb safety, lack of need for offsite response, and very good proliferation resistance. The ENHS reactor is designed to meet the requirements of Generation IV reactors including sustainable energy supply, low waste, high level of proliferation resistance, high level of safety and reliability, acceptable risk to capital and, hopefully, also competitive busbar cost of electricity

  3. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  4. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  5. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  6. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  7. Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles

    Science.gov (United States)

    2016-04-01

    Update Will Enable Autonomous Driving. Retrieved August 6, 2015, from http://spectrum.ieee.org/: http://spectrum.ieee.org/ cars -that-think...Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles 1 UNCLASSIFIED Cyber Security Considerations for... Autonomous Tactical Wheeled Vehicles Sebastian C Iovannitti 4/1/2016 Submitted to Lawrence Technological University College of Management in

  8. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  9. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  10. An autonomic security monitor for distributed operating systems

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Maj, S.; Matthews, B.

    2011-01-01

    This paper presents an autonomic system for the monitoring of security-relevant information in a Grid-based operating system. The system implements rule-based policies using Java Drools. Policies are capable of controlling the system environment based on changes in levels of CPU/memory usage, accesses to system resources, detection of abnormal behaviour such as DDos attacks.

  11. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  12. Design of an Autonomous Transport System for Coastal Areas

    Directory of Open Access Journals (Sweden)

    Andrzej Lebkowski

    2018-03-01

    Full Text Available The article presents a project of an autonomous transport system that can be deployed in coastal waters, bays or between islands. Presented solutions and development trends in the transport of autonomous and unmanned units (ghost ships are presented. The structure of the control system of autonomous units is discussed together with the presentation of applied solutions in the field of artificial intelligence. The paper presents the concept of a transport system consisting of autonomous electric powered vessels designed to carry passengers, bikes, mopeds, motorcycles or passenger cars. The transport task is to be implemented in an optimal way, that is, most economically and at the same time as safe as possible. For this reason, the structure of the electric propulsion system that can be found on such units is shown. The results of simulation studies of autonomous system operation using simulator of marine navigational environment are presented.

  13. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  14. Transportation Security Institute: recruiting next generation professionals.

    Science.gov (United States)

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  15. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  16. Analysis and comparison of transportation security systems

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1976-05-01

    The role of modeling in the analysis of transportation security systems is described. Various modeling approaches are outlined. The conflict model developed in Sandia Laboratories' Transportation Mode Analysis for the NRC Special Safeguards Study is used to demonstrate the capability of models to determine system sensitivities and compare alternatives

  17. Surface Transportation Security Priority Assessment

    Science.gov (United States)

    2010-03-01

    intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States...Modernizing the information technology infrastructure used to vet the identity of travelers and transportation workers  Using terrorist databases to...examination of persons travelling , surface transportation modes tend to operate in a much more open environment, making it difficult to screen workers

  18. Securing the Aviation Transportation System

    Science.gov (United States)

    2007-12-01

    additional 100,000 airport workers who perform duties in sterile areas (the indoor gate area past the security check point).197 These same...containing thirteen handguns, an assault rifle and eight pounds of marijuana .270 However, two Federal Air Marshals were also onboard the aircraft.271

  19. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  20. Secure Autonomous Automated Scheduling (SAAS). Rev. 1.1

    Science.gov (United States)

    Walke, Jon G.; Dikeman, Larry; Sage, Stephen P.; Miller, Eric M.

    2010-01-01

    This report describes network-centric operations, where a virtual mission operations center autonomously receives sensor triggers, and schedules space and ground assets using Internet-based technologies and service-oriented architectures. For proof-of-concept purposes, sensor triggers are received from the United States Geological Survey (USGS) to determine targets for space-based sensors. The Surrey Satellite Technology Limited (SSTL) Disaster Monitoring Constellation satellite, the UK-DMC, is used as the space-based sensor. The UK-DMC's availability is determined via machine-to-machine communications using SSTL's mission planning system. Access to/from the UK-DMC for tasking and sensor data is via SSTL's and Universal Space Network's (USN) ground assets. The availability and scheduling of USN's assets can also be performed autonomously via machine-to-machine communications. All communication, both on the ground and between ground and space, uses open Internet standards

  1. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  2. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  3. Applications of autonomous robots in safety and security

    CSIR Research Space (South Africa)

    Sabatta, D

    2012-10-01

    Full Text Available stream_source_info Sabatta_2012.pdf.txt stream_content_type text/plain stream_size 7596 Content-Encoding ISO-8859-1 stream_name Sabatta_2012.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Applications of Autonomous... ? This is a typical slide with space for headline and body text ? Pictures may be included ? Do not use fonts smaller than 18pts ? Do not use headlines with fonts smaller than 24pts ? CSIR 2012 Slide 19 A simple slide layout ? This is a typical slide...

  4. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  5. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  6. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  7. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.

    2013-01-01

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.

  8. IT-security challenges in IoT environments and autonomous systems

    Science.gov (United States)

    Heun, Ulrich

    2017-05-01

    Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.

  9. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  10. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  11. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  12. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  13. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  14. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  15. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  16. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  17. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  18. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport

  19. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  20. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  1. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  2. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  3. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  4. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  5. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  6. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  7. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  8. A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform

    Directory of Open Access Journals (Sweden)

    Jingjie Zhang

    2018-01-01

    Full Text Available With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. For example, data stored in the cloud platform may be attacked, and its security is difficult to be guaranteed. Therefore, we must attach weight to the issue of how to protect the data stored in the cloud. To protect data, data monitoring is a necessary process. Based on autonomic computing, we develop a cloud data monitoring system on the cloud platform, monitoring whether the data is abnormal in the cycle and analyzing the security of the data according to the monitored results. In this paper, the feasibility of the scheme can be verified through simulation. The results show that the proposed method can adapt to the dynamic change of cloud platform load, and it can also accurately evaluate the degree of abnormal data. Meanwhile, by adjusting monitoring frequency automatically, it improves the accuracy and timeliness of monitoring. Furthermore, it can reduce the monitoring cost of the system in normal operation process.

  9. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  10. RF energy harvesting and transport for wireless autonomous sensor network applications

    NARCIS (Netherlands)

    Keyrouz, S.; Visser, H.J.

    2013-01-01

    "RF Energy Harvesting and Transport for Wireless Autonomous Sensor Network Applications: Principles and Requirements" - For wireless energy transfer over longer distances, the far-field transfer of RF energy may be used. We make a distinction between harvesting RF energy from signals present in the

  11. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  12. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  13. Emerging issues in transportation information infrastructure security

    Science.gov (United States)

    1996-07-31

    On October 26-27, 1995, over two hundred transportation leaders and decision-makers from around the nation convened in Cambridge, Massachusetts to participate in a two day symposium on "Challenges and Opportunities for Global Transportation in the 21...

  14. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  15. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  16. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  17. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  18. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  19. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  20. Incorporating security into the transportation planning process.

    Science.gov (United States)

    2009-03-01

    The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those di...

  1. Transportation Security Leadership: The Right Stuff

    National Research Council Canada - National Science Library

    Burke, Karen

    2008-01-01

    .... transportation systems from terrorist threats. With the growing complexity and global nature of the terrorist networks, it requires leadership that is collaborative, integrative, and able to take a holistic leadership approach...

  2. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  3. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  4. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  5. Security and health protection during the transport of hazardous substances

    International Nuclear Information System (INIS)

    Benkovic, Z.; Bobic, V.

    2009-01-01

    The introduction of this work describes the legal regulations which regulate the conditions and method of the transport of hazardous substances, necessary documentation for storage, forwarding and transport. Hazardous substances are defined and classified according to the ADR. The necessary security measures which are taken for the transport of particular types of hazardous substances are mentioned. Marking and labeling of vehicles for the transport of hazardous substances (plates and lists of hazards), packing and marking of packaging is important. The safety measures which are taken at the filling stations of combustible liquids as well as places specially organized for filling, prohibitions and limitations and necessary transport documentation are mentioned. It is visible from the above mentioned that the activity of the whole security chain is necessary and depends on the good knowledge of basic characteristics and features of substances. All the participants in the security chain have to be familiar with and consistently obey the legal regulations. The manufacturer must know the features of the hazardous substance, supervisory services must be acquainted with the threat and potential danger. The hauler and intervention forces must, in case of accidents and damage, be familiar with the emergency procedures in case of accidents and act properly regarding the threatening dangerous substance.(author)

  6. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  7. Data analysis-based autonomic bandwidth adjustment in software defined multi-vendor optical transport networks.

    Science.gov (United States)

    Li, Yajie; Zhao, Yongli; Zhang, Jie; Yu, Xiaosong; Jing, Ruiquan

    2017-11-27

    Network operators generally provide dedicated lightpaths for customers to meet the demand for high-quality transmission. Considering the variation of traffic load, customers usually rent peak bandwidth that exceeds the practical average traffic requirement. In this case, bandwidth provisioning is unmetered and customers have to pay according to peak bandwidth. Supposing that network operators could keep track of traffic load and allocate bandwidth dynamically, bandwidth can be provided as a metered service and customers would pay for the bandwidth that they actually use. To achieve cost-effective bandwidth provisioning, this paper proposes an autonomic bandwidth adjustment scheme based on data analysis of traffic load. The scheme is implemented in a software defined networking (SDN) controller and is demonstrated in the field trial of multi-vendor optical transport networks. The field trial shows that the proposed scheme can track traffic load and realize autonomic bandwidth adjustment. In addition, a simulation experiment is conducted to evaluate the performance of the proposed scheme. We also investigate the impact of different parameters on autonomic bandwidth adjustment. Simulation results show that the step size and adjustment period have significant influences on bandwidth savings and packet loss. A small value of step size and adjustment period can bring more benefits by tracking traffic variation with high accuracy. For network operators, the scheme can serve as technical support of realizing bandwidth as metered service in the future.

  8. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  9. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  10. Considerations concerning the secure transport of radioactive materials in Romania

    International Nuclear Information System (INIS)

    Vieru, Gheorghe

    2002-01-01

    As UNO member and founding member of the IAEA, Romania has implemented national regulations concerning the transport of radioactive materials in complete safety, complying with recommendations by IAEA and other international organizations. Accordingly, the National Commission for Nuclear Activities Control, CNCAN, issued the Directive no. 374/October 2001 which provides the rules for secure radioactive material transport in Romania on roads, rail ways, sea/fluvial and air ways. The paper presents the main sources of producing radioactive materials focussing the following: mining of natural uranium ore, nuclear fuel fabrication plants, nuclear power plants operation, nuclear research reactors, industrial use of radioactive sources (as gamma radiography), use of radioisotope in scientific, educational or medical units. The paper pays attention to the special routes and containers adopted for most secure transport of radioactive waste. Finally, one presents specific issues relating to identification and evaluation of the risk factors occurring at the transport of radioactive waste, as well as the potential radiological consequences upon population and environment. Estimated are the collective risk doses for different categories of populations from areas adjacent to the routes of radioactive materials transportation. It is stressed that the annual collective dose which the population is exposed to in case of accident is comparable with the dose from the natural (cosmic radiation background)

  11. 49 CFR 209.501 - Review of rail transportation safety and security route analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Review of rail transportation safety and security....820 § 209.501 Review of rail transportation safety and security route analysis. (a) Review of route... establish that the route chosen by the carrier poses the least overall safety and security risk, the...

  12. Sustainability of Self-Driving Mobility: An Analysis of Carbon Emissions Between Autonomous Vehicles and Conventional Modes of Transportation

    OpenAIRE

    Mccarthy, John Francis

    2017-01-01

    The primary contribution of this paper is to identify the potential variables through which vehicle automation may affect carbon emissions in the transportation sector, and compare modal shifts between conventional vehicles, public transportation, and pilot autonomous vehicles (AVs). AV programs that are rapidly emerging in cities, states, and nations across the globe mark the early stages of the next transportation revolution akin to the steam engine and assembly line. By safely allowing hum...

  13. Development and Testing of Intelligent Alcohol Transportation Security System

    Directory of Open Access Journals (Sweden)

    Velaphi Msomi

    2018-01-01

    Full Text Available The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. The system was developed such that only the radar level sensor (VEGAPULS 62 might be in contact with the fluid and the rest of the system remained outside the liquid carrying container to be secured. The system was developed such that it reports any abnormal liquid level drop through short message service (SMS. The functioning of the developed system was tested through the use of 1040 L Intermediate Bulk Container (IBC filled with water which was hauled for about 1.5 km. The liquid theft was simulated and the system sent two SMS. The first SMS reported the beginning of water level drop and the second one reported the ending of water level drop. The second SMS reported the amount of liquid that was taken out of the container.

  14. Sample handling and transport for the Secure Automated Fabrication line

    International Nuclear Information System (INIS)

    Sherrell, D.L.; Jensen, J.D.; Genoway, G.G.; Togesen, H.J.

    1983-06-01

    A totally automated system is described which packages, transports, receives, and unpackages sintered plutonium/uranium oxide fuel pellet samples to support automated chemical analysis equipment for the Secure Automated Fabrication (SAF) line. Samples are transferred 100 meters from the fuel production line to a different floor of the facility where automatic determinations are made for purposes of process control and fuel quality certification. The system automatically records identification numbers, net weights sent and received, and all other pertinent information such as fuel lot number, sample point, date, and time of day

  15. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  16. An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

    Science.gov (United States)

    Alomari, Firas

    2013-01-01

    The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…

  17. Autonomous vehicles:challenges, opportunities, and future implications for transportation policies

    Institute of Scientific and Technical Information of China (English)

    Saeed Asadi Bagloee; Madjid Tavana; Mohsen Asadi; Tracey Oliver

    2016-01-01

    This study investigates the challenges and opportunities pertaining to transportation policies that may arise as a result of emerging autonomous vehicle (AV) technologies. AV technologies can decrease the trans-portation cost and increase accessibility to low-income households and persons with mobility issues. This emerg-ing technology also has far-reaching applications and implications beyond all current expectations. This paper provides a comprehensive review of the relevant literature and explores a broad spectrum of issues from safety to machine ethics. An indispensable part of a prospective AV development is communication over cars and infrastructure (connected vehicles). A major knowledge gap exists in AV technology with respect to routing behaviors. Connected-vehicle technology provides a great opportunity to imple-ment an efficient and intelligent routing system. To this end, we propose a conceptual navigation model based on a fleet of AVs that are centrally dispatched over a network seeking system optimization. This study contributes to the literature on two fronts: (i) it attempts to shed light on future opportunities as well as possible hurdles associated with AV technology;and (ii) it conceptualizes a navigation model for the AV which leads to highly efficient traffic circulations.

  18. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...... on a complete model representation of the individual components of the system; three different types of conventional generators are included in the model, while the protection system is also incorporated. The load shedding following faults is finally discussed....

  19. 75 FR 75621 - Office of Commercial Space Transportation; Waiver of Autonomous Reentry Restriction for a Reentry...

    Science.gov (United States)

    2010-12-06

    ... Dragon's reentry to Earth is in the public interest and will not jeopardize public health and safety... proposes that the FAA permit the autonomous reentry of a healthy Dragon at the nominal landing location in...; (2) the vehicle has the ability to autonomously guide itself to the same pre-determined landing site...

  20. Security Measures and some Specific Features of the Transport Police Functioning in Russia and Abroad

    Directory of Open Access Journals (Sweden)

    Petr P. Ignatushenko

    2017-03-01

    Full Text Available In the present article specifics of the transport police work in the Russian Federation are discussed, as well as in other countries of the world (USA, Germany, Israel, etc.. Attention is drawn to the need of the role and significance of the Russian police review in the matters of railway and aviation security, as well as safety on river and sea transport. The term “transport security” is a state of security of transport and transport infrastructure, consumers of transport services (passengers from various types of threats (natural and man-made, as well as acts of unlawful interference in the activities of various modes of transport – points put the author. Transport security issues are important for the creation of the transport police system in the Russian Federation, taking into account experience of foreign countries.

  1. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  2. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  3. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  4. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  5. Action at sea: Transport security exercise conducted off the coast of Sweden

    International Nuclear Information System (INIS)

    Isaksson, Stig; Jawerth, Nicole

    2015-01-01

    As in an action movie, ships, helicopters and uniformed people set the scene off the coast of Sweden on 6 May 2015 when national authorities conducted an exercise on security while transporting spent nuclear fuel. The exercise was part of a joint project with the IAEA to test and evaluate a new IAEA guide on planning, conducting and evaluating transport security exercises. The test subject and model was the security framework of Sweden’s national nuclear transport system, which regularly ships used fuel from power plants along the coast to the country’s interim storage facility for spent nuclear fuel.

  6. THE PROBLEM OF PROPER CARGO SECURING IN ROAD TRANSPORT – CASE STUDY

    Directory of Open Access Journals (Sweden)

    Maria CIEŚLA

    2013-12-01

    Full Text Available This paper presents the problem of improper security of cargo in trucks as the cause of about 25% of the accidents that takes place in road transport. Attention was drawn to aspects of legal liability for errors resulting from incorrect load securing according to polish law. Article was enriched with practical examples illustrating the effects of improper cargo securing on transport unit and shows how it had to be prepared properly. When planning the proper transport protection of metal sheets rolled both calculation methods and computer applications were used.

  7. Intelligent autonomous systems 12. Vol. 2. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sukhan [Sungkyunkwan Univ., Gyeonggi-Do (Korea, Republic of). College of Information and Communication Engineering; Yoon, Kwang-Joon [Konkuk Univ., Seoul (Korea, Republic of); Cho, Hyungsuck [Daegu Gyeongbuk Institute of Science and Technology, Daegu (Korea, Republic of); Lee, Jangmyung (eds.) [Pusan National Univ. (Korea, Republic of). Dept. of Electronics Engineering

    2013-02-01

    Recent research in Intelligent and Autonomous Systems. Volume 2 of the proceedings of the 12th International Conference IAS-12, held June 26-29, 2012, jeju Island, Korea. Written by leading experts in the field. Intelligent autonomous systems are emerged as a key enabler for the creation of a new paradigm of services to humankind, as seen by the recent advancement of autonomous cars licensed for driving in our streets, of unmanned aerial and underwater vehicles carrying out hazardous tasks on-site, and of space robots engaged in scientific as well as operational missions, to list only a few. This book aims at serving the researchers and practitioners in related fields with a timely dissemination of the recent progress on intelligent autonomous systems, based on a collection of papers presented at the 12th International Conference on Intelligent Autonomous Systems, held in Jeju, Korea, June 26-29, 2012. With the theme of ''Intelligence and Autonomy for the Service to Humankind, the conference has covered such diverse areas as autonomous ground, aerial, and underwater vehicles, intelligent transportation systems, personal/domestic service robots, professional service robots for surgery/rehabilitation, rescue/security and space applications, and intelligent autonomous systems for manufacturing and healthcare. This volume 2 includes contributions devoted to Service Robotics and Human-Robot Interaction and Autonomous Multi-Agent Systems and Life Engineering.

  8. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  9. Transportation management and security during the 2004 Democratic National Convention

    Science.gov (United States)

    2005-01-05

    The transportation operations plan for the 2004 Democratic National Convention (DNC) in Boston, Massachusetts, was not a typical transportation plan driven by goals such as mobility and air quality. The DNC was the first national political convention...

  10. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    Science.gov (United States)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  11. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  12. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  13. Goal system for comparative assessments of nuclear fuel transport under security aspects

    International Nuclear Information System (INIS)

    Behrendt, V.; Schwieren, G.

    1983-01-01

    Due to the great hazard potential of nuclear fuel transports the possibility always exists during transportation that either a single perpetrator or a group of perpetrators will try to get possession of the nuclear fuel. One can assume that at the end of such illegal actions there will be a politically (or otherwise) motivated extortion. Thinking about security one has to face things like sabotage, attacks from inside or outside the system, robbery and/or dispersion of the transported goods. In respect to the security of nuclear transports we carried out an investigation for the German Ministry of the Interior in order to review the different levels of security of different transport systems. This paper deals with the methodological approach, especially with the goal system and the way we executed the investigation

  14. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  15. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  16. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  17. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  19. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  20. Safety and security in transportation of radioactive material- the perception of risk

    Energy Technology Data Exchange (ETDEWEB)

    Ericsson, A.M.; Jaernry, C. [AMC Konsult AB, Bromma (Sweden)

    2004-07-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations.

  1. Safety and security in transportation of radioactive material- the perception of risk

    International Nuclear Information System (INIS)

    Ericsson, A.M.; Jaernry, C.

    2004-01-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations

  2. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  3. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  4. Legal Framework and Best Practice for Improving Transport Security of Radioactive and Nuclear Materials in Croatia

    International Nuclear Information System (INIS)

    Ilijas, B.; Medakovic, S.

    2012-01-01

    Security of transporting radioactive and nuclear materials always poses a demanding task to the holder of the authorization or beneficiary, and especially transporter. Very strict and precise legal framework must be done for this purpose, yet it has not be too complicated to create a great problems in practice. The best balance between efficiency and simplicity should be achieved. In Croatia on power is 'The Dangerous Goods Transport Act' which stipulates the conditions for the carriage of dangerous goods in individual transport modes, obligations of persons participating in the carriage, requirements for packaging and vehicles, conditions for the appointment of safety advisers and safety adviser's rights and duties, competence and conditions for the implementation of training programs for persons participating in transport, competence of the state authorities related to such carriage and supervision of the implementation of the Act. Besides this Act, which regulates the issue in more general way, in preparation is a new 'Ordinance on Physical Security Measures for Radioactive Sources, Nuclear Material and Nuclear Facilities'. The intention of this Ordinance, in the part dealing with transport, is to bring specific approach, in accordance with IAEA guides, forwarding the most of obligations to the holder of the authorization or beneficiary and transporter, leaving state regulatory bodies mostly supervising role. In practice this can create some problems in the beginning, but with rising security awareness and after some experience collected, this can be the best way to achieve satisfactory security, yet not slowing down and complicating regular jobs with radioactive and nuclear materials.(author).

  5. Security in the transport of radioactive material - interim guidance for comment

    International Nuclear Information System (INIS)

    Legoux, P.; Wangler, M.

    2004-01-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal authorities

  6. Security in the transport of radioactive material - interim guidance for comment

    Energy Technology Data Exchange (ETDEWEB)

    Legoux, P.; Wangler, M. [International Atomic Energy Agency, Vienna (Austria)

    2004-07-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal

  7. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  8. A review of tsp as one of the transportation security aspects of nuclear materials

    International Nuclear Information System (INIS)

    Wiryono

    2013-01-01

    A review has done for the Transportation Safety Plan (TSP) as one of the aspects of safety in the transport of nuclear materials. The review is necessary to harmonize national regulations with international practice. International practice of using TSP as one of the security requirements in addition to the Radiation Protection Program as a requirement of safety in the transport of nuclear materials. TSP is intended to ensure sound implementation of the transport of nuclear materials. TSP evaluation process can be done with a prescriptive approach, performance, and combinations. TSP contains information about administrative requirements, delivery security and response planning. TSP can be used to ensure the security of the implementation of the transport of nuclear materials effectively and efficiently. BAPETEN should require the applicant to submit the TSP as one document security requirements prior approval transporting nuclear materials. BAPETEN need to define the approach to the formulation and evaluation of TSP. BAPETEN need to set up an evaluation and inspection procedures for the implementation of TSP. (author)

  9. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  10. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  11. 12th International Conference on Intelligent Autonomous Systems

    CERN Document Server

    Cho, Hyungsuck; Yoon, Kwang-Joon; Lee, Jangmyung

    2013-01-01

    Intelligent autonomous systems are emerged as a key enabler for the creation of a new paradigm of services to humankind, as seen by the recent advancement of autonomous cars licensed for driving in our streets, of unmanned aerial and underwater vehicles carrying out hazardous tasks on-site, and of space robots engaged in scientific as well as operational missions, to list only a few. This book aims at serving the researchers and practitioners in related fields with a timely dissemination of the recent progress on intelligent autonomous systems, based on a collection of papers presented at the 12th International Conference on Intelligent Autonomous Systems, held in Jeju, Korea, June 26-29, 2012. With the theme of “Intelligence and Autonomy for the Service to Humankind, the conference has covered such diverse areas as autonomous ground, aerial, and underwater vehicles, intelligent transportation systems, personal/domestic service robots, professional service robots for surgery/rehabilitation, rescue/security ...

  12. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  13. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  14. Transportation

    National Research Council Canada - National Science Library

    Adams, James; Carr, Ron; Chebl, Maroun; Coleman, Robert; Costantini, William; Cox, Robert; Dial, William; Jenkins, Robert; McGovern, James; Mueller, Peter

    2006-01-01

    ...., trains, ships, etc.) and maximizing intermodal efficiency. A healthy balance must be achieved between the flow of international commerce and security requirements regardless of transportation mode...

  15. Application of the API/NPRA SVA methodology to transportation security issues.

    Science.gov (United States)

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  16. Autonomous Cargo Transport System for an Unmanned Aerial Vehicle, using Visual Servoing

    Directory of Open Access Journals (Sweden)

    Noah Kuntz

    2009-12-01

    Full Text Available This paper presents the design and testing of a system for autonomous tracking, pickup, and delivery of cargo via an unmanned helicopter. The tracking system uses a visual servoing algorithm and is tested using open loop velocity control of a six degree of freedom gantry system with a camera mounted via a pan-tilt unit on the end effecter. The pickup system uses vision to direct the camera pan tilt unit to track the target, and uses a hook attached to a second pan tilt unit to pick up the cargo. The ability of the pickup system to hook a target is tested by mounting it on the Systems Integrated Sensor Test Rig gantry system while recorded helicopter velocities are played back by the test rig.

  17. Substantiating the Target Level of Economic Security of Transport Enterprises and the Instrumentarium for Its Provision

    Directory of Open Access Journals (Sweden)

    Lebedko Sergiy A.

    2017-10-01

    Full Text Available The article is aimed at substantiating the methodology for assessing the economic security of transport enterprises, determining the target level and the instrumentarium for its provision. The proposed methodical approach to the assessment of the level of economic security of transport enterprises includes the determination of the level of counteracting threats and is based on the principles of integral estimation. The formed integrated indicator includes both indicators of counteracting the internal (human, managerial and technological, force majeure, financial and external threats (market, stakeholder, power-based, natural, infrastructural. Each measure of counteracting threats is determined by results of assessment of dynamics of the three indicators. A practical testing of the proposed approach is carried out in the case of transport enterprises. Based on the established equation of the regression relationship between the level of economic security and the financial strength, a target level of economic security of transport enterprises has been substantiated. The instrumentarium to provide a targeted level of economic security according to the threat types, including preventive and reactive measures, has been developed.

  18. Spent Nuclear Fuel Transportation Risk Assessment Methodology for Homeland Security

    International Nuclear Information System (INIS)

    Teagarden, Grant A.; Canavan, Kenneth T.; Nickell, Robert E.

    2006-01-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI was selected by U.S. DHS and ASME to develop and demonstrate a nuclear sector specific methodology for owner / operators to utilize in performing a Risk Analysis and Management for Critical Asset Protection (RAMCAP) assessment for the transportation of spent nuclear fuel (SNF). The objective is to characterize SNF transportation risk for risk management opportunities and to provide consistent information for DHS decision making. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. Worst reasonable case scenarios characterize risk for a benchmark set of threats and consequence types. A trial application was successfully performed and implementation is underway by one utility. (authors)

  19. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  20. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  1. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  2. The Impact of Road Transporter Development Trajectory onto Cargo Safety and Security

    Directory of Open Access Journals (Sweden)

    Márton Lányi

    2018-03-01

    Full Text Available This article attempts to reveal the general behavioural norms of cargo carriers, with a predominant emphasis on security issues. The security awareness level of road transporters has been found hugely dependent on management capabilities. Additionally, this poses a risk factor indicative of a shipment load's quantity and value. At a certain level of road transporter development trajectory, broad research delineates a sharp increase in security awareness, stemming from leadership recognition at larger companies. The results of the following research findings are significantly similar to various well respected scientific theories which verify the hypothesis that the principal barrier to developing a company is a combination of a lack of management capabilities and an unwillingness to adapt to change.

  3. Towards an autonomous system for handling inter-terminal container transport

    NARCIS (Netherlands)

    dr. J.H.R. van Duin; ir. F.G. Rieck; A. Spruit

    2017-01-01

    As part of the National Transition Board Practice Research Raak/SIA program, the INTRALOG (intelligent Truck Application in Logistics) project investigated the practical application of zero emission Automatic Guided Trucks (AGTs) for the transport of containers in the Harbour Industrial Cluster

  4. Intralog Towards an autonomous system for handling inter-terminal container transport

    NARCIS (Netherlands)

    Spruijt, Adrie; van Duin, Ron; Rieck, Frank

    2017-01-01

    As part of the National Transition Board Practice Research Raak/SIA program, the INTRALOG (intelligent Truck Application in Logistics) project investigated the practical application of zero emission Automatic Guided Trucks (AGTs) for the transport of containers in the Harbour Industrial Cluster

  5. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  6. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  7. Autonomous Micro-Modular Mobile Data Center Cloud Computing Study for Modeling, Simulation, Information Processing and Cyber-Security Viability

    Data.gov (United States)

    National Aeronautics and Space Administration — Cloud computing environments offer opportunities for malicious users to penetrate security layers and damage, destroy or steal data. This ability can be exploited to...

  8. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-03-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  9. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-06-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  10. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  11. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  12. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  13. Autonomic Neuropathy

    Science.gov (United States)

    ... risk of autonomic neuropathy. Other diseases. Amyloidosis, porphyria, hypothyroidism and cancer (usually due to side effects from treatment) may also increase the risk of autonomic neuropathy. ...

  14. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  15. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  16. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  17. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  18. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  19. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  20. KIF1A, an axonal transporter of synaptic vesicles, is mutated in hereditary sensory and autonomic neuropathy type 2.

    Science.gov (United States)

    Rivière, Jean-Baptiste; Ramalingam, Siriram; Lavastre, Valérie; Shekarabi, Masoud; Holbert, Sébastien; Lafontaine, Julie; Srour, Myriam; Merner, Nancy; Rochefort, Daniel; Hince, Pascale; Gaudet, Rébecca; Mes-Masson, Anne-Marie; Baets, Jonathan; Houlden, Henry; Brais, Bernard; Nicholson, Garth A; Van Esch, Hilde; Nafissi, Shahriar; De Jonghe, Peter; Reilly, Mary M; Timmerman, Vincent; Dion, Patrick A; Rouleau, Guy A

    2011-08-12

    Hereditary sensory and autonomic neuropathy type II (HSANII) is a rare autosomal-recessive disorder characterized by peripheral nerve degeneration resulting in a severe distal sensory loss. Although mutations in FAM134B and the HSN2 exon of WNK1 were associated with HSANII, the etiology of a substantial number of cases remains unexplained. In addition, the functions of WNK1/HSN2 and FAM134B and their role in the peripheral nervous system remain poorly understood. Using a yeast two-hybrid screen, we found that KIF1A, an axonal transporter of synaptic vesicles, interacts with the domain encoded by the HSN2 exon. In parallel to this screen, we performed genome-wide homozygosity mapping in a consanguineous Afghan family affected by HSANII and identified a unique region of homozygosity located on chromosome 2q37.3 and spanning the KIF1A gene locus. Sequencing of KIF1A in this family revealed a truncating mutation segregating with the disease phenotype. Subsequent sequencing of KIF1A in a series of 112 unrelated patients with features belonging to the clinical spectrum of ulcero-mutilating sensory neuropathies revealed truncating mutations in three additional families, thus indicating that mutations in KIF1A are a rare cause of HSANII. Similarly to WNK1 mutations, pathogenic mutations in KIF1A were almost exclusively restricted to an alternatively spliced exon. This study provides additional insights into the molecular pathogenesis of HSANII and highlights the potential biological relevance of alternative splicing in the peripheral sensory nervous system. Copyright © 2011 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  1. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    Science.gov (United States)

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  2. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  3. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  4. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  5. Stochastic Security and Risk-Constrained Scheduling for an Autonomous Microgrid with Demand Response and Renewable Energy Resources

    DEFF Research Database (Denmark)

    Vahedipour-Dahraie, Mostafa; Rashidizadeh-Kermani, Homa; Najafi, Hamid Reza

    2017-01-01

    is to determine the optimal scheduling with considering risk aversion and system frequency security to maximise the expected profit of operator. To deal with various uncertainties, a riskconstrained two-stage stochastic programming model is proposed where the risk aversion of MG operator is modelled using...... of customers can be effectively applied to balance the demand and supply in electricity networks. This study presents a novel stochastic model from a microgrid (MG) operator perspective for energy and reserve scheduling considering risk management strategy. It is assumed that the MG operator can procure energy...... conditional value at risk method. Extensive numerical results are shown to demonstrate the effectiveness of the proposed framework....

  6. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  7. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  8. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  9. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  10. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  11. Analysis of satisfaction factors at urban transport interchanges: Measuring travelers’ attitudes to information, security and waiting

    Energy Technology Data Exchange (ETDEWEB)

    Lois Garcia, D.; Monzon de Caceres, A.; Hernandez del Olmo, S.

    2016-07-01

    Transport interchanges can be considered as a node, where people transfer from one mode to another, and as a place to stay, using facilities and services as well as waiting areas. Reducing disruption of transfer in multimodal trips is a key element for assuring seamless mobility in big cities. Based on previous research (Hernández & Monzón, 2016) this paper aims to explore the predictive capacity of attitudes towards several service factors on general satisfaction with transport interchange. Complementary, it was analyzing how personal and trip characteristics are related to evaluation of some variables, and examining the influence of waiting time on the perceived quality. To that end, a two steps methodology was conducted (personal and on-line interview) in a representative sample of 740 users (54% female, 55% work purpose trip). We performed path analysis to test the model showing a satisfactory statistical fit. The model developed show good performance for predicting general satisfaction at Moncloa Transport Interchange (Madrid, Spain). The outputs of the model indicate that Information and Safety and Security factors predicted 49% of general satisfaction. Furthermore, the results showed also a strong association between evaluation of Design and Environmental quality, factors that not affect directly general satisfaction but do so through Information and Safety & Security perception, acting the last as mediator variables. Nevertheless, spending time queuing inside the interchange show a negative influence on Information and Safety & Security, while age of participants affect negatively to Information, which mean that elder have some cognitive accessibility problems. Moreover, our data shows gender differences in safety perception, since women feel less safe (particularity the youngest) inside the interchange. The results indicate a number of priority measures to enhance. (Author)

  12. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  13. Transports of radioactive materials. Legal regulations, safety and security concepts, experience

    International Nuclear Information System (INIS)

    Schwarz, Guenther

    2012-01-01

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  14. A Modular, Reusable Latch and Decking System for Securing Payloads During Launch and Planetary Surface Transport

    Science.gov (United States)

    Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.

    2011-01-01

    Efficient handling of payloads destined for a planetary surface, such as the moon or mars, requires robust systems to secure the payloads during transport on the ground, in space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been

  15. Connected and autonomous vehicles 2040 vision.

    Science.gov (United States)

    2014-07-01

    The Pennsylvania Department of Transportation (PennDOT) commissioned a one-year project, Connected and Autonomous : Vehicles 2040 Vision, with researchers at Carnegie Mellon University (CMU) to assess the implications of connected and : autonomous ve...

  16. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability

    National Research Council Canada - National Science Library

    Hoaglund, Robert; Gazda, Walter

    2007-01-01

    The goal of this analysis is to provide ASCO and its customers with a comprehensive approach to the development of quantitative performance measures to assess security improvements to the port system...

  17. Autonomous houses. Autonomous house

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, S. (Tokai University, Tokyo (Japan). Faculty of Engineering)

    1991-09-30

    Self-sufficiency type houses are outlined. On condition that people gain a certain amount of income in relation with the society, they self-suffice under the given environment, allowing themselves to accept a minimum of industrial products with small environmental load. Ordinary supply from outside of fossil energy and materials which depend on it is minimized. Types are classified into three: energy, energy materials and perfect self-sufficiency. A study project for environment symbiotic houses is progressing which is planned by the Ministry of Construction and Institute of Building Energy Conservation and is invested by a private company. Its target is making a house for halving an environmental load by CO{sub 2}, for the purpose of creating the environment symbiotic house which is nice to and in harmony with the global environment and human beings. As a part of the studies on energy-saving and resource conservation on houses, introduced is a plan of an autonomous house at Izu-Atagawa. The passive method and high thermal-insulation are used for air conditioning, and hot spring water for hot water supply. Electric power is generated by hydroelectric power generation using mountain streams and by solar cells. Staple food is purchased, while subsidiary food is sufficed. 17 refs., 4 figs., 1 tab.

  18. Surface transportation security : TSA has taken actions to manage risk, improve coordination, and measure performance, but additional actions would enhance its efforts, April 21, 2010.

    Science.gov (United States)

    2010-04-21

    Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...

  19. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  20. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  1. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  2. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  3. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  4. How Can Autonomous and Connected Vehicles, Electromobility, BRT, Hyperloop, Shared Use Mobility and Mobility-As-A-Service Shape Transport Futures for the Context of Smart Cities?

    Directory of Open Access Journals (Sweden)

    Alexandros Nikitas

    2017-11-01

    Full Text Available A smarter transport system that caters for social, economic and environmental sustainability is arguably one of the most critical prerequisites for creating pathways to more livable urban futures. This paper aims to provide a state-of-the-art analysis of a selection of mobility initiatives that may dictate the future of urban transportation and make cities smarter. These are mechanisms either recently introduced with encouraging uptake so far and much greater potential to contribute in a shift to a better transport paradigm or still in an embryonic stage of their development and yet to be embraced as powerful mechanisms that could change travel behaviour norms. Autonomous and connected vehicles are set to revolutionise the urban landscape by allowing machines to take over driving that for over a century has been exclusively a human activity, while electrical vehicles are already helping decarbonising the transport sector. Bus rapid transit has been steadily reinventing and rebranding conventional bus services revitalising the use of the humblest form of public transport, while hyperloop is an entirely new, disruptive, and somewhat provocative, travel mode proposition based on the use of sealed tube systems through which pods could travel free of air resistance with speeds exceeding 1000 km/h. Shared use mobility mechanisms like car-sharing, ride-sharing, ride-sourcing and public bicycles can help establishing a culture for using mobility resources on an as-needed basis, while mobility-as-a-service will take this sharing culture a step further, offering tailored mobility and trip planning packages that could entirely replace the need for privately owned modes of transport.

  5. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    Science.gov (United States)

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake M.

    2013-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs…

  6. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  7. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  8. Autonomous search

    CERN Document Server

    Hamadi, Youssef; Saubion, Frédéric

    2012-01-01

    Autonomous combinatorial search (AS) represents a new field in combinatorial problem solving. Its major standpoint and originality is that it considers that problem solvers must be capable of self-improvement operations. This is the first book dedicated to AS.

  9. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  10. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  11. 3-D Vision Techniques for Autonomous Vehicles

    Science.gov (United States)

    1988-08-01

    TITLE (Include Security Classification) W 3-D Vision Techniques for Autonomous Vehicles 12 PERSONAL AUTHOR(S) Martial Hebert, Takeo Kanade, inso Kweoni... Autonomous Vehicles Martial Hebert, Takeo Kanade, Inso Kweon CMU-RI-TR-88-12 The Robotics Institute Carnegie Mellon University Acession For Pittsburgh

  12. Economic and Environmental Considerations for Zero-emission Transport and Thermal Energy Generation on an Energy Autonomous Island

    Directory of Open Access Journals (Sweden)

    Fontina Petrakopoulou

    2018-01-01

    Full Text Available The high cost and environmental impact of fossil-fuel energy generation in remote regions can make renewable energy applications more competitive than business-as-usual scenarios. Furthermore, energy and transport are two of the main sectors that significantly contribute to global greenhouse gas emissions. This paper focuses on the generation of thermal energy and the transport sector of a fossil fuel-based energy independent island in Greece. We evaluate (1 technologies for fully renewable thermal energy generation using building-specific solar thermal systems and (2 the replacement of the vehicle fleet of the island with electric and hydrogen-fueled vehicles. The analysis, based on economic and environmental criteria, shows that although solar thermal decreases greenhouse gases by 83%, when compared to the current diesel-based situation, it only becomes economically attractive with subsidy scenarios equal to or higher than 50%. However, in the transport sector, the sum of fuel and maintenance costs of fuel-cell and electric vehicles is found to be 45% lower than that of the current fleet, due to their approximately seven times lower fuel cost. Lastly, it will take approximately six years of use of the new vehicles to balance out the emissions of their manufacturing phase.

  13. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  14. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  15. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  16. Regional transportation operations collaboration and coordination : a primer for working together to improve transportation safety, reliability, and security

    Science.gov (United States)

    2002-01-01

    This primer was written for transportation professionals and public safety officials from cities, counties, and States who are responsible for day-to-day management and operations within a metropolitan region. It is intended to help agencies and orga...

  17. Best Practices and Lessons Learned In LANL Approaches to Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Drypolcher, Katherine Carr [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-24

    Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.

  18. Report to Congress on innovative safety and security technology solutions for alternative transportation facilities

    Science.gov (United States)

    2017-05-01

    This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...

  19. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  20. New Concepts and Perspectives on Micro-Rotorcraft and Small Autonomous Rotary-Wing Vehicles

    Science.gov (United States)

    Young, Larry A.; Aiken, E. W.; Johnson, J. L.; Demblewski, R.; Andrews, J.; Aiken, Irwin W. (Technical Monitor)

    2001-01-01

    A key part of the strategic vision for rotorcraft research as identified by senior technologists within the Army/NASA Rotorcraft Division at NASA Ames Research Center is the development and use of small autonomous rotorcraft. Small autonomous rotorcraft are defined for the purposes of this paper to be a class of vehicles that range in size from rotary-wing micro air vehicles (MAVs) to larger, more conventionally sized, rotorcraft uninhabited aerial vehicles (UAVs) - i.e. vehicle gross weights ranging from hundreds of grams to thousands of kilograms. The development of small autonomous rotorcraft represents both a technology challenge and a potential new vehicle class that will have substantial societal impact for: national security, personal transport, planetary science, and public service.

  1. Transports of radioactive materials. Legal regulations, safety and security concepts, experience; Befoerderung radioaktiver Stoffe. Rechtsvorschriften, Sicherheits- und Sicherungskonzept, Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Guenther

    2012-07-15

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  2. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  3. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    International Nuclear Information System (INIS)

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  4. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  5. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  6. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  7. Ministerial Decree of 16 February 1976 relating to approval of the model certificate of financial security for the transport of radioactive materials

    International Nuclear Information System (INIS)

    1976-01-01

    This Decree by the Minister of Industry, Commerce and Crafts, in consultation with the Minister of Transport, approves the model certificate of financial security for the transport of nuclear materials. This type of certificate issued by nuclear insurers is intended to provide detailed information on the nature of the financial security for damage likely to be caused by the materials in the course of transport; it is required to supply the certificate according to the Paris Convention on Third Party Liability in the Field of Nuclear Energy, ratified by Italy in 1975. The standardised presentation of this certificate enables it to be used in international transport between countries parties to the Paris Convention as proof of the existence of the financial security. (N.E.A.)

  8. ADRES : autonomous decentralized regenerative energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Brauner, G.; Einfalt, A.; Leitinger, C.; Tiefgraber, D. [Vienna Univ. of Technology (Austria)

    2007-07-01

    The autonomous decentralized regenerative energy systems (ADRES) research project demonstrates that decentralized network independent microgrids are the target power systems of the future. This paper presented a typical structure of a microgrid, demonstrating that all types of generation available can be integrated, from wind and small hydro to photovoltaic, fuel cell, biomass or biogas operated stirling motors and micro turbines. In grid connected operation the balancing energy and reactive power for voltage control will come from the public grid. If there is no interconnection to a superior grid, it will form an autonomous micro grid. In order to reduce peak power demand and base energy, autonomous microgrid technology requires highly efficient appliances. Otherwise large collector design, high storage and balancing generation capacities would be necessary, which would increase costs. End-use energy efficiency was discussed with reference to demand side management (DSM) strategies that match energy demand with actual supply in order to minimize the storage size needed. This paper also discussed network controls that comprise active and reactive power. Decentralized robust algorithms were investigated with reference to black-start ability and congestion management features. It was concluded that the trend to develop small decentralized grids in parallel to existing large systems will improve security of supply and reduce greenhouse gas emissions. Decentralized grids will also increase energy efficiency because regenerative energy will be used where it is collected in the form of electricity and heat, thus avoiding transport and the extension of transmission lines. Decentralized energy technology is now becoming more economic by efficient and economic mass production of components. Although decentralized energy technology requires energy automation, computer intelligence is becoming increasingly cost efficient. 2 refs., 4 figs.

  9. Application of information technology to transportation logistics and security at Northern Kentucky University.

    Science.gov (United States)

    2013-02-28

    This research grant provided the opportunity to research and deploy beneficial transportation technologies to support transit needs. Working with the Transit Authority of Northern Kentucky (TANK), solutions were developed that can apply to transit ag...

  10. Forecasting of the radioactive material transport demand for the Brazilian Nuclear Program and the security aspects

    International Nuclear Information System (INIS)

    Meldonian, Nelson Leon

    1979-01-01

    In the nuclear fuel cycle, a lot of radioactive materials are produced. These radioactive materials must be transported in order to promote the integration of the fuel cycle units. Considerations about the transport characteristics of radioactive material were made for each section of the fuel cycle. These considerations were based on the experience of several countries and in accordance with the International Atomic Energy Agency regulations. A prediction of transport demands for the Brazilian Nuclear Program until year 2.010 was made. The prediction refers mainly to the quantity of radioactive material produced in each section of the cycle the quantity of vehicles needed for the transport of these materials. Several safety aspects were considered specially, the accidents predictions for years 2.000 and 2.010. The accident probability in Brazilian railroads and highways was compared with that of the USA. (author)

  11. SAFETY AND SECURITY IMPROVEMENT IN PUBLIC TRANSPORTATION BASED ON PUBLIC PERCEPTION IN DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Tri Basuki JOEWONO

    2006-01-01

    Three aspects of an improvement agenda are proposed based on the perception data, namely technology, management, and institution. This agenda is clarified by a set of action plans incorporating the responsible parties and a time frame. The action plan is divided into three terms to define a clear goal for each step. The short-term action focuses on the hardware and on preparing further steps, whereas the medium-term action focuses on developing and improving the standard of safety and security. The long-term action focuses on advancing safety and security practices. The effectiveness of this agenda and action plan rests upon a set of assumptions, such as the degree of seriousness from the authoritative institution, fair distribution of information, the availability of reasonable resources, and coordinated and collaborative action from all parties involved to reach the objective.

  12. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  13. Interpersonal communication and issues for autonomous vehicles.

    Science.gov (United States)

    2017-06-01

    Interpersonal roadway communication is a vital component of the transportation system. Road users communicate to coordinate movement and increase roadway safety. Future autonomous vehicle research needs to account for the role of interpersonal roadwa...

  14. Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Editor)

    2004-01-01

    The existing U.S. hub-and-spoke air transportation system is reaching saturation. Major aspects of the current system, such as capacity, safety, mobility, customer satisfaction, security, communications, and ecological effects, require improvements. The changing dynamics - increased presence of general aviation, unmanned autonomous vehicles, military aircraft in civil airspace as part of homeland defense - contributes to growing complexity of airspace. The system has proven remarkably resistant to change. NASA Langley Research Center and the National Institute of Aerospace conducted a workshop on Transportation Network Topologies on 9-10 December 2003 in Williamsburg, Virginia. The workshop aimed to examine the feasibility of traditional methods for complex system analysis and design as well as potential novel alternatives in application to transportation systems, identify state-of-the-art models and methods, conduct gap analysis, and thus to lay a foundation for establishing a focused research program in complex systems applied to air transportation.

  15. Secure and economic operational of a gas transportation system; Operacion economica y segura de un sistema de transporte de gas

    Energy Technology Data Exchange (ETDEWEB)

    Sardi, Oscar Jose; Trichilo, Claudia; Valpreda, Carlos [Transportadora de Gas del Sur S.A. (Argentina)

    2003-07-01

    Since 1992, Transportadora de Gas del Sur (TGS) has been operating the longest gas pipeline system in South America. Prior to that date, the system was managed by GE, a state-owned company. Early on in the administration of the company, some improvement opportunities were identified in the technical, commercial, management and personnel fields. An integrated transformation process was developed which involved major investments, acquisition of new technology, re-design of the work force, and new work methodologies. The course of action followed by the company was based on an attempt to achieve permanent improvement on business results. This paper is the result of the improvements applied to our gas transportation system. Due to the time and cost assessment required by scheduled turbine compressor maintenance works (83 - 538.220 hp), a Contingency Plan for turbine compressor breakdowns was established as well as an Economic Dispatch, which can determine low-cost operations in specific periods of time (during the year). This work details the actions taken. (author)

  16. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  17. Autonomous Byte Stream Randomizer

    Science.gov (United States)

    Paloulian, George K.; Woo, Simon S.; Chow, Edward T.

    2013-01-01

    Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.

  18. Transport safety and struggle against malevolent acts: a synergy to be developed - Protecting transports against malevolent acts, Synergies between security and safety: lessons learned from the IAEA international conference, Role of the IRSN transport operational level in the field of safety, Transparency and secret in the field of nuclear material transport

    International Nuclear Information System (INIS)

    Riac, Christian; Flory, Denis; Loiseau, Olivier; Mermaz, Frederic; Demolins, Laurent

    2012-01-01

    The first article proposes an interview with the chief of the security department within the French ministry of Ecology, Sustainable Development, Transports and Housing who comments his missions and his relationships with the ASN and the French Home Office for the protection and control of nuclear materials. A second article discusses the lessons learned from an IAEA international conference about the relationship between the approaches to security and to safety. The third article briefly describes the role of the IRSN transport operational level in the field of safety. The last article discusses how opposite notions like transparency and secret are managed in the case of nuclear material transport

  19. Compliant tiedown system for securing a cask for transporting radioactive materials to a vehicle

    International Nuclear Information System (INIS)

    Richardson, R.V.

    1991-01-01

    This patent describes a tiedown system for releasably securing a cask having opposing trunnions to a cradle assembly that in turn is mounted onto the deck and frame of a vehicle. The cradle assembly includes at least one cradle member for supporting the weight of the cask, and wherein the cask trunnions are displaceable in opposite vertical directions relative to the cradle member of the cradle assembly when the assembly is torsionally flexed, and the cask rotates relative to the cradle member, about a horizontally oriented axis comprising a compliant linkage means including a tie-bar means operably connected between the trunnions and moveably mounted within the cradle assembly for applying a biasing force on each of the trunnions that remains substantially constant despite the opposite vertical displacement of the trunnions relative to the cradle member that results from the torsional flexing of the vehicle deck

  20. Latching device for securing a closure to a cask for transporting radioactive waste

    International Nuclear Information System (INIS)

    Obermeyer, F.D.; Cruz, R.R.; Bieberbach, G.

    1991-01-01

    This patent describes a latching device for removably securing and sealingly engaging a closure around an opening in a cask defined by an edge of the cask. It comprises: at least three shear key assemblies uniformly spaced around the outer portion of the closure, each of which includes a shear key means having a bolt portion movably mounted in the closure, and a latch portion that is insertable into and retractable out of a slot means in the cask edge in response to the application of a closing and an opening force applied to the bolt portion, at least one drive mechanism located within a cavity in the closure and connected to the bolt portion of the shear key assemblies for applying the closing and opening forces to the bolt portions

  1. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    International Nuclear Information System (INIS)

    2010-01-01

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products. The Area 5 PA model assumes activity disposed in trenches is well mixed within the native alluvium of the trench at the time the facility is closed. Waste containers and waste forms are assumed not to limit the release of radionuclides for transport. In the Area 5 RWMS PA model, the pathways that are considered to bring radioactivity in the waste zone to the surface soils of the closure covers are (1) plant uptake, (2) burrowing animal activity, and (3) advection/dispersion/diffusion in the pore water. Water-phase transport is a minor component of the transport, which is dominated by plant uptake and burrowing animal activity. Because the soil column is mostly dry, upward water flux rates are extremely small, resulting in small advective/dispersive transport of radioactive isotopes in pore water of the unsaturated zone. Reactive transport of radioactive elements in the Area 5 soil pore water are modeled using element-specific partition coefficients (Kds) that partition radioactivity between pore water and soil of the disposal cell, and solubility limits that control the solubility of elements in pore water. Geochemical modeling is not performed in the Area 5 RWMS GoldSim PA model; however, Kds and solubility limits were derived from previous geochemical modeling performed using Area 5 geochemical data. Kds for uranium were developed based on geochemical modeling using the mineral characteristics of soil (alluvium) and the chemical characteristics of water at the site (Carle et al., 2002). In the GoldSim model, uranium Kd is represented with a lognormal distribution with a mean value of 0.8 milliliter per gram (taken from Figure 4.11, Page 4-19 of Carle et al

  2. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  3. Towards autonomous vehicular clouds

    Directory of Open Access Journals (Sweden)

    Stephan Olariu

    2011-09-01

    Full Text Available The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, autonomous vehicular clouds (AVCs. A key feature distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theaters of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities and smart electric power grids will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time and with right-sized resources.

  4. Fleet management for autonomous vehicles

    OpenAIRE

    Bsaybes, Sahar; Quilliot, Alain; Wagler, Annegret K.

    2016-01-01

    The VIPAFLEET project consists in developing models and algorithms for man- aging a fleet of Individual Public Autonomous Vehicles (VIPA). Hereby, we consider a fleet of cars distributed at specified stations in an industrial area to supply internal transportation, where the cars can be used in different modes of circulation (tram mode, elevator mode, taxi mode). One goal is to develop and implement suitable algorithms for each mode in order to satisfy all the requests under an economic point...

  5. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  6. Models Supporting Trajectory Planning in Autonomous Vehicles

    OpenAIRE

    Ward, Erik

    2018-01-01

    Autonomous vehicles have the potential to drastically improve the safety, efficiency and cost of transportation. Instead of a driver, an autonomous vehicle is controlled by an algorithm, offering improved consistency and the potential to eliminate human error from driving: by far the most common cause of accidents. Data collected from different types of sensors, along with prior information such as maps, are used to build models of the surrounding traffic scene, encoding relevant aspects of t...

  7. Autonomic Nervous System Disorders

    Science.gov (United States)

    Your autonomic nervous system is the part of your nervous system that controls involuntary actions, such as the beating of your heart ... breathing and swallowing Erectile dysfunction in men Autonomic nervous system disorders can occur alone or as the result ...

  8. Alleviating Autonomic Dysreflexia after Spinal Cord Injury

    Science.gov (United States)

    2017-12-01

    tracts originating from cortex, we may eventually be able to use cell transplantation as a bridge to promote targeted, functional axon regeneration ...13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS autonomic dysreflexia, spinal cord injury, transplantation, axon regeneration 16. SECURITY...different root causes – i.e. using neural precursor cells to restore more normal innervation of sympathetic preganglionic neurons and

  9. A Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation

    Directory of Open Access Journals (Sweden)

    Ali Abduljalil Abdulla

    2017-08-01

    Full Text Available In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The LPS25HP pressure sensor attached to an STM32F411 microcontroller is utilized as a height measurement system to estimate the robot’s current floor inside the elevator. The ultrasonic sensor is used to recognize the elevator’s door status. Many challenges have to be solved to realize a stable height measurement system based on pressure sensor readings. The difference of the pressure sensor readings before and after soldering is realized by comparing the reading after soldering with an accurate barometric reading. In addition, the sensor output signal shows oscillation and wide variation of the same floor pressure sensor readings at different times. The oscillation in the output signal has been handled using a first order FIR smoothing filter. The first order filter was selected to balance between the stability and the elapsed time to receive the updated values. An auto-calibration stage is established to maintain the wide variation in the atmospheric pressure readings by calibrating the sensor readings with the robot’s current floor before entering the elevator. An error handling management system is utilized to guarantee a stable automated elevator management system performance. Many experiments to assess and verify the performance of the automated elevator management system and robot’s current floor estimation are reported. The experimental results show that the proposed methods and sub-systems developed for the mobile robot are effective and efficient in providing a transportation service in multiple-floor life sciences laboratories.

  10. Autonomous Energy Grids: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, Benjamin D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Dall-Anese, Emiliano [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Bernstein, Andrey [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Zhang, Yingchen [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hodge, Brian S [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-04

    With much higher levels of distributed energy resources - variable generation, energy storage, and controllable loads just to mention a few - being deployed into power systems, the data deluge from pervasive metering of energy grids, and the shaping of multi-level ancillary-service markets, current frameworks to monitoring, controlling, and optimizing large-scale energy systems are becoming increasingly inadequate. This position paper outlines the concept of 'Autonomous Energy Grids' (AEGs) - systems that are supported by a scalable, reconfigurable, and self-organizing information and control infrastructure, can be extremely secure and resilient (self-healing), and self-optimize themselves in real-time for economic and reliable performance while systematically integrating energy in all forms. AEGs rely on scalable, self-configuring cellular building blocks that ensure that each 'cell' can self-optimize when isolated from a larger grid as well as partaking in the optimal operation of a larger grid when interconnected. To realize this vision, this paper describes the concepts and key research directions in the broad domains of optimization theory, control theory, big-data analytics, and complex system modeling that will be necessary to realize the AEG vision.

  11. Internetting tactical security sensor systems

    Science.gov (United States)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  12. Autonomous execution of the Precision Immobilization Technique

    Science.gov (United States)

    Mascareñas, David D. L.; Stull, Christopher J.; Farrar, Charles R.

    2017-03-01

    Over the course of the last decade great advances have been made in autonomously driving cars. The technology has advanced to the point that driverless car technology is currently being tested on publicly accessed roadways. The introduction of these technologies onto publicly accessed roadways not only raises questions of safety, but also security. Autonomously driving cars are inherently cyber-physical systems and as such will have novel security vulnerabilities that couple both the cyber aspects of the vehicle including the on-board computing and any network data it makes use of, with the physical nature of the vehicle including its sensors, actuators, and the vehicle chassis. Widespread implementation of driverless car technology will require that both the cyber, as well as physical security concerns surrounding these vehicles are addressed. In this work, we specifically developed a control policy to autonomously execute the Precision Immobilization Technique, a.k.a. the PIT maneuver. The PIT maneuver was originally developed by law enforcement to end high-speed vehicular pursuits in a quasi-safe manner. However, there is still a risk of damage/roll-over to both the vehicle executing the PIT maneuver as well as to the vehicle subject to the PIT maneuver. In law enforcement applications, it would be preferable to execute the PIT maneuver using an autonomous vehicle, thus removing the danger to law-enforcement officers. Furthermore, it is entirely possible that unscrupulous individuals could inject code into an autonomously-driving car to use the PIT maneuver to immobilize other vehicles while maintaining anonymity. For these reasons it is useful to know how the PIT maneuver can be implemented on an autonomous car. In this work a simple control policy based on velocity pursuit was developed to autonomously execute the PIT maneuver using only a vision and range measurements that are both commonly collected by contemporary driverless cars. The ability of this

  13. Testing for autonomic neuropathy

    DEFF Research Database (Denmark)

    Hilsted, J

    1984-01-01

    Autonomic neuropathy is a common complication in long-term diabetes, about 30% of the patients showing measurable signs of autonomic dysfunction after 10 years duration of disease. The diagnosis is often difficult to establish because clinical symptoms generally occur late in the course of the di......Autonomic neuropathy is a common complication in long-term diabetes, about 30% of the patients showing measurable signs of autonomic dysfunction after 10 years duration of disease. The diagnosis is often difficult to establish because clinical symptoms generally occur late in the course...

  14. Biologically-Inspired Concepts for Autonomic Self-Protection in Multiagent Systems

    Science.gov (United States)

    Sterritt, Roy; Hinchey, Mike

    2006-01-01

    Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors &om nature and the human body, such as the autonomic nervous system. Agent technologies have been identified as a key enabler for engineering autonomy and autonomicity in systems, both in terms of retrofitting into legacy systems and in designing new systems. Handing over responsibility to systems themselves raises concerns for humans with regard to safety and security. This paper reports on the continued investigation into a strand of research on how to engineer self-protection mechanisms into systems to assist in encouraging confidence regarding security when utilizing autonomy and autonomicity. This includes utilizing the apoptosis and quiescence metaphors to potentially provide a self-destruct or self-sleep signal between autonomic agents when needed, and an ALice signal to facilitate self-identification and self-certification between anonymous autonomous agents and systems.

  15. Compact mobile-reader system for two-way wireless communication, tracking and status monitoring for transport safety and security

    Science.gov (United States)

    Tsai, Han-Chung; Liu, Yung Y.; Lee, Hok L.; Craig, Brian; Byrne, Kevin; Mittal, Ketan; Scherer, Justin C.

    2016-12-06

    A system for monitoring a plurality radio frequency identification tags is described. The system uses at least one set of radio frequency identification tags. Each tag is attached to a container and includes several sensors for detecting physical conditions of said container. The system includes at least one autonomous intermediate reader in wireless communication with the frequency identification tags. The intermediate reader includes external wireless communication system, intermediate reader logic controller, and a self-contained rechargeable power supply. The system uses a central status reporting system in communication the intermediate reader.

  16. The Human Element and Autonomous Ships

    Directory of Open Access Journals (Sweden)

    Sauli Ahvenjärvi

    2016-09-01

    Full Text Available The autonomous ship technology has become a “hot” topic in the discussion about more efficient, environmentally friendly and safer sea transportation solutions. The time is becoming mature for the introduction of commercially sensible solutions for unmanned and fully autonomous cargo and passenger ships. Safety will be the most interesting and important aspect in this development. The utilization of the autonomous ship technology will have many effects on the safety, both positive and negative. It has been announced that the goal is to make the safety of an unmanned ship better that the safety of a manned ship. However, it must be understood that the human element will still be present when fully unmanned ships are being used. The shore-based control of a ship contains new safety aspects and an interesting question will be the interaction of manned and unmanned ships in the same traffic area. The autonomous ship technology should therefore be taken into account on the training of seafarers. Also it should not be forgotten that every single control algorithm and rule of the internal decision making logic of the autonomously navigating ship has been designed and coded by a human software engineer. Thus the human element is present also in this point of the lifetime navigation system of the autonomous ship.

  17. Semi-Autonomous Systems Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — VisionThe Semi-Autonomous Systems Lab focuses on developing a comprehensive framework for semi-autonomous coordination of networked robotic systems. Semi-autonomous...

  18. Genetic autonomic disorders.

    Science.gov (United States)

    Axelrod, Felicia B

    2013-03-01

    Genetic disorders affecting the autonomic nervous system can result in abnormal development of the nervous system or they can be caused by neurotransmitter imbalance, an ion-channel disturbance or by storage of deleterious material. The symptoms indicating autonomic dysfunction, however, will depend upon whether the genetic lesion has disrupted peripheral or central autonomic centers or both. Because the autonomic nervous system is pervasive and affects every organ system in the body, autonomic dysfunction will result in impaired homeostasis and symptoms will vary. The possibility of genetic confirmation by molecular testing for specific diagnosis is increasing but treatments tend to remain only supportive and directed toward particular symptoms. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  20. Transportation

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    Here is the decree of the thirtieth of July 1998 relative to road transportation, to trade and brokerage of wastes. It requires to firms which carry out a road transportation as well as to traders and to brokers of wastes to declare their operations to the prefect. The declaration has to be renewed every five years. (O.M.)

  1. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  2. Security in transport, storage and disposal of radioactive materials, providing to the department of nuclear medicine in hospitals Rafael Angel Calderon Guardia, San Juan de Dios and Mexico

    International Nuclear Information System (INIS)

    Elizondo Valle, Alejandro; Jimenez Mendez, Christian; Leiton Araya, Christopher; Villalobos Rodriguez, Geovanny; Leal Vega, Olga Maritza; Lopez Gatjens, Santiago

    2010-01-01

    The security is analysed for the transport and storage of radioactive sources and the management of radioactive waste product of practices and interventions in nuclear medicine services in hospitals Calderon Guardia, San Juan de Dios and Mexico. The objective is to assess the compliance with current regulations, the effectiveness and efficiency of the same. The security and compliance with current regulations were considered related to the transport of radioactive sources by the two private companies that provide this service, from the Juan Santamaria airport customs to three hospitals evaluated. Compliance with national and international rules on storage of radioactive sources and waste materials were analyzed. For this has been studied Costa Rican law and the recommendations of international organizations related to the subject matter, in the three nuclear medicine services valued. The national and international background related to radiological accidents occurred with radioactive sources during transport, storage and waste were revised, where highlights that in most cases, these accidents occurred for breach of the regulations established. Studies in Costa Rica on radioactive waste management were analysed, and the current status of nuclear medicine services in terms of radiation safety, which helped with the investigation. The compliance and regulations were analyzed by the result of observation and interviews during development, to finally make a series of findings and provide recommendations that are considered relevant. Various variants and indicators that are defined in the theoretical framework were used; also, the strategy of methodology is described. The purpose of the work has been to provide a scientific nature, and that methodology met the objectives, offering an approach from different angles and the actors involved, and a critical and objective analysis strictly in order to contribute to public health. The research is a valuable tool that provides

  3. Transportation

    National Research Council Canada - National Science Library

    Allshouse, Michael; Armstrong, Frederick Henry; Burns, Stephen; Courts, Michael; Denn, Douglas; Fortunato, Paul; Gettings, Daniel; Hansen, David; Hoffman, D. W; Jones, Robert

    2007-01-01

    .... The ability of the global transportation industry to rapidly move passengers and products from one corner of the globe to another continues to amaze even those wise to the dynamics of such operations...

  4. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  5. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  6. Autonomous driving technical, legal and social aspects

    CERN Document Server

    Gerdes, J; Lenz, Barbara; Winner, Hermann

    2016-01-01

    This book takes a look at fully automated, autonomous vehicles and discusses many open questions: How can autonomous vehicles be integrated into the current transportation system with diverse users and human drivers? Where do automated vehicles fall under current legal frameworks? What risks are associated with automation and how will society respond to these risks? How will the marketplace react to automated vehicles and what changes may be necessary for companies? Experts from Germany and the United States define key societal, engineering, and mobility issues related to the automation of vehicles. They discuss the decisions programmers of automated vehicles must make to enable vehicles to perceive their environment, interact with other road users, and choose actions that may have ethical consequences. The authors further identify expectations and concerns that will form the basis for individual and societal acceptance of autonomous driving. While the safety benefits of such vehicles are tremendous, the auth...

  7. Legal and security requirements for the air transportation of cyanotoxins and toxigenic cyanobacterial cells for legitimate research and analytical purposes.

    Science.gov (United States)

    Metcalf, J S; Meriluoto, J A O; Codd, G A

    2006-05-25

    Cyanotoxins are now recognised by international and national health and environment agencies as significant health hazards. These toxins, and the cells which produce them, are also vulnerable to exploitation for illegitimate purposes. Cyanotoxins are increasingly being subjected to national and international guidelines and regulations governing their production, storage, packaging and transportation. In all of these respects, cyanotoxins are coming under the types of controls imposed on a wide range of chemicals and other biotoxins of microbial, plant and animal origin. These controls apply whether cyanotoxins are supplied on a commercial basis, or stored and transported in non-commercial research collaborations and programmes. Included are requirements concerning the transportation of these toxins as documented by the United Nations, the International Air Transport Association (IATA) and national government regulations. The transportation regulations for "dangerous goods", which by definition include cyanotoxins, cover air mail, air freight, and goods checked in and carried on flights. Substances include those of determined toxicity and others of suspected or undetermined toxicity, covering purified cyanotoxins, cyanotoxin-producing laboratory strains and environmental samples of cyanobacteria. Implications of the regulations for the packaging and air-transport of dangerous goods, as they apply to cyanotoxins and toxigenic cyanobacteria, are discussed.

  8. Autonomous Propellant Loading Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The AES Autonomous Propellant Loading (APL) project consists of three activities. The first is to develop software that will automatically control loading of...

  9. Autonomous Systems and Operations

    Data.gov (United States)

    National Aeronautics and Space Administration — The AES Autonomous Systems and Operations (ASO) project will develop an understanding of the impacts of increasing communication time delays on mission operations,...

  10. Decision from the Commission of Electricity Regulation (CRE) dated from May 2, 2002 about a dispute between the manager of the power transportation network (RTE) and the autonomous administration of Parisian transports (RATP) relative to the conditions of consideration of the multiplicity of power supply points in the contractual system of access to the power grid; Decision de la Commission de Regulation de l'Electricite (CRE) en date du 2 mai 2002 sur un different qui oppose le gestionnaire du Reseau de Transport d'Electricite (RTE) et la Regie Autonome des Transports Parisiens (RATP) relatif aux conditions de prise en compte de la multiplicite des points de livraison dans le dispositif contractuel d'acces au reseau electrique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-05-01

    This document is the analysis made by the French commission of electricity regulation (CRE) about a dispute between the French manager of the power transportation grid (RTE) and the autonomous administration of Parisian transports (RATP) about its contract of access to the grid for the power supply of the underground railway of Paris. The RATP requested a regrouping of all its 7 supply points in a single contract. After analysis of the hearings, the CRE considers that no discrimination exists in the contractual system proposed by the RTE and thus the RATP request has been rejected. (J.S.)

  11. Autonomous Star Tracker Algorithms

    DEFF Research Database (Denmark)

    Betto, Maurizio; Jørgensen, John Leif; Kilsgaard, Søren

    1998-01-01

    Proposal, in response to an ESA R.f.P., to design algorithms for autonomous star tracker operations.The proposal also included the development of a star tracker breadboard to test the algorithms performances.......Proposal, in response to an ESA R.f.P., to design algorithms for autonomous star tracker operations.The proposal also included the development of a star tracker breadboard to test the algorithms performances....

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. Editorial for special issue on Perception and Navigation for Autonomous Vehicles

    OpenAIRE

    Laugier , Christian; Philippe , Martinet; Urbano , Nunes

    2014-01-01

    International audience; This Special Issue of the IEEE Robotics and Automation Magazine has been prepared in the scope of the activities of the Technical Committee on "Autonomous Ground Vehicle and Intelligent Transportation System" (AGV-ITS) (http://www.ieee-ras.org/autonomous-groundvehicles- and-intelligent-transportation-systems) of the IEEE Robotics and Automation Society (IEEE RAS).

  14. Autonomic cardiac innervation

    Science.gov (United States)

    Hasan, Wohaib

    2013-01-01

    Autonomic cardiac neurons have a common origin in the neural crest but undergo distinct developmental differentiation as they mature toward their adult phenotype. Progenitor cells respond to repulsive cues during migration, followed by differentiation cues from paracrine sources that promote neurochemistry and differentiation. When autonomic axons start to innervate cardiac tissue, neurotrophic factors from vascular tissue are essential for maintenance of neurons before they reach their targets, upon which target-derived trophic factors take over final maturation, synaptic strength and postnatal survival. Although target-derived neurotrophins have a central role to play in development, alternative sources of neurotrophins may also modulate innervation. Both developing and adult sympathetic neurons express proNGF, and adult parasympathetic cardiac ganglion neurons also synthesize and release NGF. The physiological function of these “non-classical” cardiac sources of neurotrophins remains to be determined, especially in relation to autocrine/paracrine sustenance during development.   Cardiac autonomic nerves are closely spatially associated in cardiac plexuses, ganglia and pacemaker regions and so are sensitive to release of neurotransmitter, neuropeptides and trophic factors from adjacent nerves. As such, in many cardiac pathologies, it is an imbalance within the two arms of the autonomic system that is critical for disease progression. Although this crosstalk between sympathetic and parasympathetic nerves has been well established for adult nerves, it is unclear whether a degree of paracrine regulation occurs across the autonomic limbs during development. Aberrant nerve remodeling is a common occurrence in many adult cardiovascular pathologies, and the mechanisms regulating outgrowth or denervation are disparate. However, autonomic neurons display considerable plasticity in this regard with neurotrophins and inflammatory cytokines having a central regulatory

  15. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  16. Perception, Planning, Control, and Coordination for Autonomous Vehicles

    Directory of Open Access Journals (Sweden)

    Scott Drew Pendleton

    2017-02-01

    Full Text Available Autonomous vehicles are expected to play a key role in the future of urban transportation systems, as they offer potential for additional safety, increased productivity, greater accessibility, better road efficiency, and positive impact on the environment. Research in autonomous systems has seen dramatic advances in recent years, due to the increases in available computing power and reduced cost in sensing and computing technologies, resulting in maturing technological readiness level of fully autonomous vehicles. The objective of this paper is to provide a general overview of the recent developments in the realm of autonomous vehicle software systems. Fundamental components of autonomous vehicle software are reviewed, and recent developments in each area are discussed.

  17. 3rd Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 3rd quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014 in Tables 4 and 5. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report do not include minor volumes of non-radioactive materials that were approved for disposal. Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to differing rounding conventions.

  18. 1st Quarter Transportation Report FY 2015: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC, Las Vegas, NV (United States)

    2015-02-20

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 1st quarter of Fiscal Year (FY) 2015 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report include minor volumes of non-radioactive classified waste/material that were approved for disposal (non-radioactive classified or nonradioactive classified hazardous). Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to rounding conventions for volumetric conversions from cubic meters to cubic feet.

  19. Transportation

    Science.gov (United States)

    2007-01-01

    Faculty ii INDUSTRY TRAVEL Domestic Assistant Deputy Under Secretary of Defense (Transportation Policy), Washington, DC Department of...developed between the railroad and trucking industries. Railroads: Today’s seven Class I freight railroad systems move 42% of the nation’s intercity ...has been successfully employed in London to reduce congestion and observed by this industry study during its travels . It is currently being

  20. The ALMT Family of Organic Acid Transporters in Plants and Their Involvement in Detoxification and Nutrient Security.

    Science.gov (United States)

    Sharma, Tripti; Dreyer, Ingo; Kochian, Leon; Piñeros, Miguel A

    2016-01-01

    About a decade ago, members of a new protein family of anion channels were discovered on the basis of their ability to confer on plants the tolerance toward toxic aluminum ions in the soil. The efflux of Al 3+ -chelating malate anions through these channels is stimulated by external Al 3+ ions. This feature of a few proteins determined the name of the entire protein family as Aluminum-activated Malate Transporters (ALMT). Meanwhile, after several years of research, it is known that the physiological roles of ALMTs go far beyond Al-detoxification. In this review article we summarize the current knowledge on this transporter family and assess their involvement in diverse physiological processes.

  1. The ALMT family of organic acid transporters in plants and their involvement in detoxification and nutrient security

    Directory of Open Access Journals (Sweden)

    Tripti Sharma

    2016-10-01

    Full Text Available About a decade ago, members of a new protein family of anion channels were discovered on the basis of their ability to confer on plants the tolerance towards toxic aluminum ions in the soil. The efflux of Al3+-chelating malate anions through these channels is stimulated by external Al3+ ions. This feature of a few proteins determined the name of the entire protein family as Aluminum-activated Malate Transporters (ALMT. Meanwhile, after several years of research, it is known that the physiological roles of ALMTs go far beyond Al-detoxification. In this review article we summarize the current knowledge on this transporter family and assess their involvement in diverse physiological processes.

  2. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  3. Science, technology and the future of small autonomous drones.

    Science.gov (United States)

    Floreano, Dario; Wood, Robert J

    2015-05-28

    We are witnessing the advent of a new era of robots - drones - that can autonomously fly in natural and man-made environments. These robots, often associated with defence applications, could have a major impact on civilian tasks, including transportation, communication, agriculture, disaster mitigation and environment preservation. Autonomous flight in confined spaces presents great scientific and technical challenges owing to the energetic cost of staying airborne and to the perceptual intelligence required to negotiate complex environments. We identify scientific and technological advances that are expected to translate, within appropriate regulatory frameworks, into pervasive use of autonomous drones for civilian applications.

  4. 49 CFR 8.31 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... industrial security services for the Department of Transportation. Regulations prescribed by the Secretary of...

  5. Life cycle GHG emissions from Malaysian oil palm bioenergy development: The impact on transportation sector's energy security

    International Nuclear Information System (INIS)

    Hassan, Mohd Nor Azman; Jaramillo, Paulina; Griffin, W. Michael

    2011-01-01

    Malaysia's transportation sector accounts for 41% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This paper addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse-gas emissions from land-use change. When converting primary and secondary forests to oil-palm plantations between 270-530 and 120-190 g CO 2 -equivalent per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 and 85 g CO 2 -equivalent per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. These findings are used to recommend policies for mitigating GHG emissions impacts from the growth of palm oil use in the transportation sector. - Research highlights: → We modeled greenhouse gas emissions in the production of palm-biodiesel. → Five land types were included to model emissions associated with land-use change. → Land-use change has the biggest impact on the emissions in making palm-biodiesel. → Emissions from fertilizer use and effluent treatment are still significant. → At 5% biodiesel grown on suitable lands Malaysia would obtain an emissions savings.

  6. Life cycle GHG emissions from Malaysian oil palm bioenergy development: The impact on transportation sector's energy security

    Energy Technology Data Exchange (ETDEWEB)

    Hassan, Mohd Nor Azman, E-mail: mohdnorh@andrew.cmu.ed [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Jaramillo, Paulina [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Griffin, W. Michael [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Tepper School of Business, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States)

    2011-05-15

    Malaysia's transportation sector accounts for 41% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This paper addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse-gas emissions from land-use change. When converting primary and secondary forests to oil-palm plantations between 270-530 and 120-190 g CO{sub 2}-equivalent per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 and 85 g CO{sub 2}-equivalent per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. These findings are used to recommend policies for mitigating GHG emissions impacts from the growth of palm oil use in the transportation sector. - Research highlights: {yields} We modeled greenhouse gas emissions in the production of palm-biodiesel. {yields} Five land types were included to model emissions associated with land-use change. {yields} Land-use change has the biggest impact on the emissions in making palm-biodiesel. {yields} Emissions from fertilizer use and effluent treatment are still significant. {yields} At 5% biodiesel grown on suitable lands Malaysia would obtain an emissions savings.

  7. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  8. Overview of the Autonomic Nervous System

    Science.gov (United States)

    ... be reversible or progressive. Anatomy of the autonomic nervous system The autonomic nervous system is the part of ... organs they connect with. Function of the autonomic nervous system The autonomic nervous system controls internal body processes ...

  9. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  10. Autonomous Forest Fire Detection

    NARCIS (Netherlands)

    Breejen, E. den; Breuers, M.; Cremer, F.; Kemp, R.A.W.; Roos, M.; Schutte, K.; Vries, J.S. de

    1998-01-01

    Forest fire detection is a very important issue in the pre-suppression process. Timely detection allows the suppression units to reach the fire in its initial stages and this will reduce the suppression costs considerably. The autonomous forest fire detection principle is based on temporal contrast

  11. Experimental Autonomous Vehicle Systems

    DEFF Research Database (Denmark)

    Ravn, Ole; Andersen, Nils Axel

    1998-01-01

    The paper describes the requirements for and a prototype configuration of a software architecture for control of an experimental autonomous vehicle. The test bed nature of the system is emphasised in the choice of architecture making re-configurability, data logging and extendability simple...

  12. Towards autonomous vehicles.

    Science.gov (United States)

    2013-11-01

    We are moving towards an age of autonomous vehicles. Cycles of innovation initiated in the public and private sectors : have led one into another since the 1990s; and out of these efforts have sprung a variety of Advanced Driver Assistance : Systems ...

  13. ADAM: ADaptive Autonomous Machine

    NARCIS (Netherlands)

    van Oosten, Daan C.; Nijenhuis, Lucas F.J.; Bakkers, André; Vervoort, Wiek

    1996-01-01

    This paper describes a part of the development of an adaptive autonomous machine that is able to move in an unknown world extract knowledge out of the perceived data, has the possibility to reason, and finally has the capability to exchange experiences and knowledge with other agents. The agent is

  14. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  15. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  16. Developing Policy for Urban Autonomous Vehicles: Impact on Congestion

    Directory of Open Access Journals (Sweden)

    David Metz

    2018-04-01

    Full Text Available An important problem for surface transport is road traffic congestion, which is ubiquitous and difficult to mitigate. Accordingly, a question for policymakers is the possible impact on congestion of autonomous vehicles. It seems likely that the main impact of vehicle automation will not be seen until driverless vehicles are sufficiently safe for use amid general traffic on urban streets. Shared use driverless vehicles could reduce the cost of taxis and a wider range of public transport vehicles could be economic. Individually owned autonomous vehicles would have the ability to travel unoccupied and may need to be regulated where this might add to congestion. It is possible that autonomous vehicles could provide mobility services at lower cost and wider scope, such that private car use in urban areas could decline and congestion reduce. City authorities should be alert to these possibilities in developing transport policy.

  17. Catecholamines and diabetic autonomic neuropathy

    DEFF Research Database (Denmark)

    Hilsted, J

    1995-01-01

    In diabetic patients with autonomic neuropathy plasma noradrenaline concentration, used as an index of sympathetic nervous activity, is low. This decrease is, however, only found in patients with a long duration of diabetes with clinically severe autonomic neuropathy. This apparent insensitivity...... of plasma catecholamine measurements is not due to changes in the clearance of catecholamines in diabetic autonomic neuropathy. The physiological responses to infused adrenaline and to noradrenaline are enhanced, for noradrenaline mainly cardiovascular responses. Adrenoceptors (alpha and beta adrenoceptors......) are not altered in circulating blood cells in diabetic autonomic neuropathy. Thus, a generalized up-regulation of adrenoceptors does not occur in diabetic autonomic neuropathy....

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. Analysis of selected energy security issues related to US crude oil and natural gas exploration, development, production, transportation and processing

    International Nuclear Information System (INIS)

    1990-10-01

    In July 1989, President Bush directed the Secretary of Energy to initiate the development of a comprehensive National Energy Strategy (NES) built upon a national consensus. The overall principle for the NES, as defined by the President and articulated by the Economic Policy Council (EPC), is the continuation of the successful policy of market reliance, consistent with the following goals: Balancing of energy, economic, and environmental concerns; and reduced dependence by the US and its friends and allies on potentially unreliable energy suppliers. The analyses presented in this report draw upon a large body of work previously conducted for DOE/Office of Fossil Energy, the US Department of Interior/Minerals Management Service (DOI/MMS), and the Gas Research Institute (GRI), referenced throughout the text of this report. This work includes assessments in the following areas: the potential of advanced oil and gas extraction technologies as improved through R ampersand D, along with the successful transfer of these technologies to the domestic petroleum industry; the economic and energy impacts of environmental regulations on domestic oil and gas exploration, production, and transportation; the potential of tax incentives to stimulate domestic oil and gas development and production; the potential environmental costs associated with various options for leasing for US oil and gas resources in the Outer Continental Shelf (OCS); and the economic impacts of environmental regulations affecting domestic crude oil refining

  20. GHG Emissions and Costs of Developing Biomass Energy in Malaysia: Implications on Energy Security in the Transportation and Electricity Sector

    Science.gov (United States)

    Hassan, Mohd Nor Azman

    Malaysia's transportation sector accounts for 48% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This study addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse gas emissions from land use change. When converting primary and secondary forests to oil-palm plantations between 270 - 530 g and 120 -190 g CO2 equivalent (CO2-eq) per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 to 85 g CO2-eq per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. Fossil fuels contributed about 93% to Malaysia's electricity generation mix and emit about 65 million tonnes (Mt) or 36% of the country's 2010 Greenhouse Gas (GHG) emissions. The government has set a target to install 330 MW biomass electricity by 2015, which is hoped to avoid 1.3 Mt of GHG emissions annually. The availability of seven types of biomass residues in Peninsular Malaysia is estimated based on residues-to-product ratio, recoverability and accessibility factor and other competing uses. It was found that there are approximately 12.2 Mt/yr of residues. Oil-palm residues contribute about 77% to the total availability with rice and forestry residues at 17%. Electricity from biomass can be produced via direct combustion in dedicated power plants or co-fired with coal. The co-firing of the residues at four existing coal plants in

  1. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. Autonomous Intersection Management

    Science.gov (United States)

    2009-12-01

    detects that the driver is not slowing sufficiently fast. Jaguar, Honda, and BMW offer similar systems. Nissan and Toyota have recently begun offering...that the driver is not braking hard enough. Both Toyota and BMW are currently selling vehicles that can parallel park completely autonomously, even...other vehicles. The system was tested both in simulation and with a robotic vehicle. This work is sponsored by Toyota , who have also currently have an

  4. Autonomía

    OpenAIRE

    Martínez Muñoz, Juan Antonio

    2007-01-01

    En este ensayo la noción de autonomía es estudiada de un modo diferente al sentido habitual; sus implicaciones y las contradicciones que encierra, específicamente como sucedáneo de la genuina libertad. El artículo describe el modelo de hombre presupuesto en su uso. Concluye con su inviabilidad para resolver problemas morales y sociales.

  5. Mobile Intelligent Autonomous Systems

    OpenAIRE

    Jitendra R. Raol; Ajith Gopal

    2010-01-01

    Mobile intelligent autonomous systems (MIAS) is a fast emerging research area. Although it can be regarded as a general R&D area, it is mainly directed towards robotics. Several important subtopics within MIAS research are:(i) perception and reasoning, (ii) mobility and navigation,(iii) haptics and teleoperation, (iv) image fusion/computervision, (v) modelling of manipulators, (vi) hardware/software architectures for planning and behaviour learning leadingto robotic architecture, (vii) ve...

  6. Highly Skilled Autonomous Vehicles

    OpenAIRE

    Manuel Acosta Reche; Stratis Kanarachos; Mike V Blundell

    2017-01-01

    Recent research suggests that collision mitigation on low grip surfaces might require autonomous vehicles to execute maneuvers such as drift, trail braking or Scandinavian flick. In order to achieve this it is necessary to perceive the vehicle states and their interaction with the environment, and use this information to determine the chassis limits. A first look at the virtual automotive sensing problem is provided, followed by a description of Rally driving modeling approaches. Finally, a c...

  7. Autonomous Underwater Gliders

    OpenAIRE

    Wood,; Stephen,

    2009-01-01

    Autonomous Underwater Vehicles are only now being marketed as robust commercial vehicles for many industries, and of these vehicles underwater gliders are becoming the new tool for oceanographers. Satellites have provided scientists and marine specialists with measurements of the sea surface such as temperature since the late 1970s, and data via subsurface oceanographic moorings since the 1950's. As stated by David Smeed of the National Oceanography Centre, Southampton, England, that "gliders...

  8. Nature's Autonomous Oscillators

    Science.gov (United States)

    Mayr, H. G.; Yee, J.-H.; Mayr, M.; Schnetzler, R.

    2012-01-01

    Nonlinearity is required to produce autonomous oscillations without external time dependent source, and an example is the pendulum clock. The escapement mechanism of the clock imparts an impulse for each swing direction, which keeps the pendulum oscillating at the resonance frequency. Among nature's observed autonomous oscillators, examples are the quasi-biennial oscillation and bimonthly oscillation of the Earth atmosphere, and the 22-year solar oscillation. The oscillations have been simulated in numerical models without external time dependent source, and in Section 2 we summarize the results. Specifically, we shall discuss the nonlinearities that are involved in generating the oscillations, and the processes that produce the periodicities. In biology, insects have flight muscles, which function autonomously with wing frequencies that far exceed the animals' neural capacity; Stretch-activation of muscle contraction is the mechanism that produces the high frequency oscillation of insect flight, discussed in Section 3. The same mechanism is also invoked to explain the functioning of the cardiac muscle. In Section 4, we present a tutorial review of the cardio-vascular system, heart anatomy, and muscle cell physiology, leading up to Starling's Law of the Heart, which supports our notion that the human heart is also a nonlinear oscillator. In Section 5, we offer a broad perspective of the tenuous links between the fluid dynamical oscillators and the human heart physiology.

  9. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  10. Experimental Autonomous Road Vehicle with Logical Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Sergey Sergeevich Shadrin

    2017-01-01

    Full Text Available This article describes some technical issues regarding the adaptation of a production car to a platform for the development and testing of autonomous driving technologies. A universal approach to performing the reverse engineering of electric power steering (EPS for the purpose of external control is also presented. The primary objective of the related study was to solve the problem associated with the precise prediction of the dynamic trajectory of an autonomous vehicle. This was accomplished by deriving a new equation for determining the lateral tire forces and adjusting some of the vehicle parameters under road test conductions. A Mivar expert system was also integrated into the control system of the experimental autonomous vehicle. The expert system was made more flexible and effective for the present application by the introduction of hybrid artificial intelligence with logical reasoning. The innovation offers a solution to the major problem of liability in the event of an autonomous transport vehicle being involved in a collision.

  11. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  12. Autonomous vehicles: from paradigms to technology

    Science.gov (United States)

    Ionita, Silviu

    2017-10-01

    Mobility is a basic necessity of contemporary society and it is a key factor in global economic development. The basic requirements for the transport of people and goods are: safety and duration of travel, but also a number of additional criteria are very important: energy saving, pollution, passenger comfort. Due to advances in hardware and software, automation has penetrated massively in transport systems both on infrastructure and on vehicles, but man is still the key element in vehicle driving. However, the classic concept of ‘human-in-the-loop’ in terms of ‘hands on’ in driving the cars is competing aside from the self-driving startups working towards so-called ‘Level 4 autonomy’, which is defined as “a self-driving system that does not requires human intervention in most scenarios”. In this paper, a conceptual synthesis of the autonomous vehicle issue is made in connection with the artificial intelligence paradigm. It presents a classification of the tasks that take place during the driving of the vehicle and its modeling from the perspective of traditional control engineering and artificial intelligence. The issue of autonomous vehicle management is addressed on three levels: navigation, movement in traffic, respectively effective maneuver and vehicle dynamics control. Each level is then described in terms of specific tasks, such as: route selection, planning and reconfiguration, recognition of traffic signs and reaction to signaling and traffic events, as well as control of effective speed, distance and direction. The approach will lead to a better understanding of the way technology is moving when talking about autonomous cars, smart/intelligent cars or intelligent transport systems. Keywords: self-driving vehicle, artificial intelligence, deep learning, intelligent transport systems.

  13. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  14. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  15. Autonomic Neuropathy in Diabetes Mellitus

    OpenAIRE

    Verrotti, Alberto; Prezioso, Giovanni; Scattoni, Raffaella; Chiarelli, Francesco

    2014-01-01

    Diabetic autonomic neuropathy (DAN) is a serious and common complication of diabetes, often overlooked and misdiagnosed. It is a systemic-wide disorder that may be asymptomatic in the early stages. The most studied and clinically important form of DAN is cardiovascular autonomic neuropathy defined as the impairment of autonomic control of the cardiovascular system in patients with diabetes after exclusion of other causes. The reported prevalence of DAN varies widely depending on inconsistent ...

  16. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  17. Robotics and Autonomous Systems Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides an environment for developing and evaluating intelligent software for both actual and simulated autonomous vehicles. Laboratory computers provide...

  18. Autonomic Fuselet Specification and Composition

    National Research Council Canada - National Science Library

    Mills, Peter H

    2006-01-01

    A framework for autonomic fuselet business logic development was developed, using semantic web services and workflow technologies to specify fuselet information needs, to define an executable workflow...

  19. Autonomous component carrier selection

    DEFF Research Database (Denmark)

    Garcia, Luis Guilherme Uzeda; Pedersen, Klaus; Mogensen, Preben

    2009-01-01

    management and efficient system operation. Due to the expected large number of user-deployed cells, centralized network planning becomes unpractical and new scalable alternatives must be sought. In this article, we propose a fully distributed and scalable solution to the interference management problem...... in local areas, basing our study case on LTE-Advanced. We present extensive network simulation results to demonstrate that a simple and robust interference management scheme, called autonomous component carrier selection allows each cell to select the most attractive frequency configuration; improving...... the experience of all users and not just the few best ones; while overall cell capacity is not compromised....

  20. Toward autonomous spacecraft

    Science.gov (United States)

    Fogel, L. J.; Calabrese, P. G.; Walsh, M. J.; Owens, A. J.

    1982-01-01

    Ways in which autonomous behavior of spacecraft can be extended to treat situations wherein a closed loop control by a human may not be appropriate or even possible are explored. Predictive models that minimize mean least squared error and arbitrary cost functions are discussed. A methodology for extracting cyclic components for an arbitrary environment with respect to usual and arbitrary criteria is developed. An approach to prediction and control based on evolutionary programming is outlined. A computer program capable of predicting time series is presented. A design of a control system for a robotic dense with partially unknown physical properties is presented.

  1. Autonomous mobile robot teams

    Science.gov (United States)

    Agah, Arvin; Bekey, George A.

    1994-01-01

    This paper describes autonomous mobile robot teams performing tasks in unstructured environments. The behavior and the intelligence of the group is distributed, and the system does not include a central command base or leader. The novel concept of the Tropism-Based Cognitive Architecture is introduced, which is used by the robots in order to produce behavior transforming their sensory information to proper action. The results of a number of simulation experiments are presented. These experiments include worlds where the robot teams must locate, decompose, and gather objects, and defend themselves against hostile predators, while navigating around stationary and mobile obstacles.

  2. An Experimental Platform for Autonomous Bus Development

    Directory of Open Access Journals (Sweden)

    Héctor Montes

    2017-11-01

    Full Text Available Nowadays, with highly developed instrumentation, sensing and actuation technologies, it is possible to foresee an important advance in the field of autonomous and/or semi-autonomous transportation systems. Intelligent Transport Systems (ITS have been subjected to very active research for many years, and Bus Rapid Transit (BRT is one area of major interest. Among the most promising transport infrastructures, the articulated bus is an interesting, low cost, high occupancy capacity and friendly option. In this paper, an experimental platform for research on the automatic control of an articulated bus is presented. The aim of the platform is to allow full experimentation in real conditions for testing technological developments and control algorithms. The experimental platform consists of a mobile component (a commercial articulated bus fully instrumented and a ground test area composed of asphalt roads inside the Consejo Superior de Investigaciones Científicas (CSIC premises. This paper focuses also on the development of a human machine interface to ease progress in control system evaluation. Some experimental results are presented in order to show the potential of the proposed platform.

  3. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  4. Safety performance monitoring of autonomous marine systems

    International Nuclear Information System (INIS)

    Thieme, Christoph A.; Utne, Ingrid B.

    2017-01-01

    The marine environment is vast, harsh, and challenging. Unanticipated faults and events might lead to loss of vessels, transported goods, collected scientific data, and business reputation. Hence, systems have to be in place that monitor the safety performance of operation and indicate if it drifts into an intolerable safety level. This article proposes a process for developing safety indicators for the operation of autonomous marine systems (AMS). The condition of safety barriers and resilience engineering form the basis for the development of safety indicators, synthesizing and further adjusting the dual assurance and the resilience based early warning indicator (REWI) approaches. The article locates the process for developing safety indicators in the system life cycle emphasizing a timely implementation of the safety indicators. The resulting safety indicators reflect safety in AMS operation and can assist in planning of operations, in daily operational decision-making, and identification of improvements. Operation of an autonomous underwater vehicle (AUV) exemplifies the process for developing safety indicators and their implementation. The case study shows that the proposed process leads to a comprehensive set of safety indicators. It is expected that application of the resulting safety indicators consequently will contribute to safer operation of current and future AMS. - Highlights: • Process for developing safety indicators for autonomous marine systems. • Safety indicators based on safety barriers and resilience thinking. • Location of the development process in the system lifecycle. • Case study on AUV demonstrating applicability of the process.

  5. Autonomic headache with autonomic seizures: a case report.

    Science.gov (United States)

    Ozge, Aynur; Kaleagasi, Hakan; Yalçin Tasmertek, Fazilet

    2006-10-01

    The aim of the report is to present a case of an autonomic headache associated with autonomic seizures. A 19-year-old male who had had complex partial seizures for 15 years was admitted with autonomic complaints and left hemicranial headache, independent from seizures, that he had had for 2 years and were provoked by watching television. Brain magnetic resonance imaging showed right hippocampal sclerosis and electroencephalography revealed epileptic activity in right hemispheric areas. Treatment with valproic acid decreased the complaints. The headache did not fulfil the criteria for the diagnosis of trigeminal autonomic cephalalgias, and was different from epileptic headache, which was defined as a pressing type pain felt over the forehead for several minutes to a few hours. Although epileptic headache responds to anti-epileptics and the complaints of the present case decreased with antiepileptics, it has been suggested that the headache could be a non-trigeminal autonomic headache instead of an epileptic headache.

  6. Learning for Autonomous Navigation

    Science.gov (United States)

    Angelova, Anelia; Howard, Andrew; Matthies, Larry; Tang, Benyang; Turmon, Michael; Mjolsness, Eric

    2005-01-01

    Robotic ground vehicles for outdoor applications have achieved some remarkable successes, notably in autonomous highway following (Dickmanns, 1987), planetary exploration (1), and off-road navigation on Earth (1). Nevertheless, major challenges remain to enable reliable, high-speed, autonomous navigation in a wide variety of complex, off-road terrain. 3-D perception of terrain geometry with imaging range sensors is the mainstay of off-road driving systems. However, the stopping distance at high speed exceeds the effective lookahead distance of existing range sensors. Prospects for extending the range of 3-D sensors is strongly limited by sensor physics, eye safety of lasers, and related issues. Range sensor limitations also allow vehicles to enter large cul-de-sacs even at low speed, leading to long detours. Moreover, sensing only terrain geometry fails to reveal mechanical properties of terrain that are critical to assessing its traversability, such as potential for slippage, sinkage, and the degree of compliance of potential obstacles. Rovers in the Mars Exploration Rover (MER) mission have got stuck in sand dunes and experienced significant downhill slippage in the vicinity of large rock hazards. Earth-based off-road robots today have very limited ability to discriminate traversable vegetation from non-traversable vegetation or rough ground. It is impossible today to preprogram a system with knowledge of these properties for all types of terrain and weather conditions that might be encountered.

  7. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  9. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  10. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  11. Behavioural domain knowledge transfer for autonomous agents

    CSIR Research Space (South Africa)

    Rosman, Benjamin S

    2014-11-01

    Full Text Available , and Behavior Transfer in Autonomous Robots, AAAI 2014 Fall Symposium Series, 13-15 November 2014 Behavioural Domain Knowledge Transfer for Autonomous Agents Benjamin Rosman Mobile Intelligent Autonomous Systems Modelling and Digital Science Council...

  12. From cooperative to autonomous vehicles

    NARCIS (Netherlands)

    van der Sande, T.P.J.; Nijmeijer, H.; Fossen, T.I.; Pettersen, K.Y.; Nijmeijer, H.

    2017-01-01

    What defines an autonomous vehicle? In this chapter the authors will try to answer this question and formulate the limitations of driver assistance systems as well as for—conditionally—autonomous vehicles . First a short summary of the levels of automation as provided by the society of automotive

  13. Autonomous Learner Model Resource Book

    Science.gov (United States)

    Betts, George T.; Carey, Robin J.; Kapushion, Blanche M.

    2016-01-01

    "Autonomous Learner Model Resource Book" includes activities and strategies to support the development of autonomous learners. More than 40 activities are included, all geared to the emotional, social, cognitive, and physical development of students. Teachers may use these activities and strategies with the entire class, small groups, or…

  14. 49 CFR 193.2913 - Security monitoring.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  15. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  16. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  17. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  18. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  19. Dual-Beam Antenna Design for Autonomous Sensor Network Applications

    Directory of Open Access Journals (Sweden)

    Jean-Marie Floc'h

    2012-01-01

    Full Text Available This paper describes our contribution in the ANR project called CAPNET dedicated to the site security (autonomous sensor network. The network is autonomous in term of energy and it is very easy to deploy on the site (the time to deploy each node of the network is around 10 minutes. The first demonstrator was deployed in the fire base station of Brest, France with 10 nodes with a security perimeter around 1.5 km. Our contribution takes place in the field of antennas, with the development of two systems: a single-beam antenna reserved for the supervisor or the last node of the network, and a dual-beam antenna dedicated to the node in linear configuration. For the design and optimization of antennas, we use HFSS CAD software from ANSOFT. The antennas have been designed and successfully measured.

  20. Research Institute for Autonomous Precision Guided Systems

    National Research Council Canada - National Science Library

    Rogacki, John R

    2007-01-01

    ... vehicles, cooperative flight of autonomous aerial vehicles using GPS and vision information, cooperative and sharing of information in search missions involving multiple autonomous agents, multi-scale...

  1. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  2. Mobile Autonomous Reconfigurable System

    Directory of Open Access Journals (Sweden)

    Pavliuk N.A.

    2018-04-01

    Full Text Available The object of this study is a multifunctional modular robot able to assemble independently in a given configuration and responsively change it in the process of operation depending on the current task. In this work we aim at developing and examining unified modules for a modular robot, which can both perform autonomous movement and form a complex structure by connecting to other modules. The existing solutions in the field of modular robotics were reviewed and classified by power supply, the ways of interconnection, the ways of movement and the possibility of independent movement of separate modules. Basing on the analysis of the shortcomings of existing analogues, we have developed a module of mobile autonomous reconfigurable system, including a base unit, a set of magneto-mechanical connectors and two motor wheels. The basic kinematic scheme of the modular robot, the features of a single module, as well as the modular structure formed by an array of similar modules were described. Two schemes for placing sets of magneto-mechanical connectors in the basic module have been proposed. We described the principle of operation of a magneto-mechanical connector based on redirection of the magnetic flux of a permanent magnet. This solution simplifies the system for controlling a mechanism of connection with other modules, increases energy efficiency and a battery life of the module. Since the energy is required only at the moment of switching the operating modes of the connector, there is no need to power constantly the connector mechanism to maintain the coupling mode.

  3. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  4. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  5. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  6. Autonomous E-Mobility as a Service - Final Report

    OpenAIRE

    Pitera, Kelly; Marinelli, Giuseppe

    2017-01-01

    Mobility as a Service (MaaS) is a systems-oriented approach of integration of numerous transport services into a single, seamless mobility service using a technology platform. Building on MaaS to incorporate both electric and autonomous mobility, the concept of Autonomous E-Mobility as a Service (AE-MaaS) is examined within this project as a way to improve the environmental sustainability of urban mobility. Through a series of workshops and meetings, the aim was to understand the feasibility ...

  7. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  8. Active matter logic for autonomous microfluidics

    Science.gov (United States)

    Woodhouse, Francis G.; Dunkel, Jörn

    2017-04-01

    Chemically or optically powered active matter plays an increasingly important role in materials design, but its computational potential has yet to be explored systematically. The competition between energy consumption and dissipation imposes stringent physical constraints on the information transport in active flow networks, facilitating global optimization strategies that are not well understood. Here, we combine insights from recent microbial experiments with concepts from lattice-field theory and non-equilibrium statistical mechanics to introduce a generic theoretical framework for active matter logic. Highlighting conceptual differences with classical and quantum computation, we demonstrate how the inherent non-locality of incompressible active flow networks can be utilized to construct universal logical operations, Fredkin gates and memory storage in set-reset latches through the synchronized self-organization of many individual network components. Our work lays the conceptual foundation for developing autonomous microfluidic transport devices driven by bacterial fluids, active liquid crystals or chemically engineered motile colloids.

  9. National transportation statistics 2010

    Science.gov (United States)

    2010-01-01

    National Transportation Statistics presents statistics on the U.S. transportation system, including its physical components, safety record, economic performance, the human and natural environment, and national security. This is a large online documen...

  10. Cybersecurity for aerospace autonomous systems

    Science.gov (United States)

    Straub, Jeremy

    2015-05-01

    High profile breaches have occurred across numerous information systems. One area where attacks are particularly problematic is autonomous control systems. This paper considers the aerospace information system, focusing on elements that interact with autonomous control systems (e.g., onboard UAVs). It discusses the trust placed in the autonomous systems and supporting systems (e.g., navigational aids) and how this trust can be validated. Approaches to remotely detect the UAV compromise, without relying on the onboard software (on a potentially compromised system) as part of the process are discussed. How different levels of autonomy (task-based, goal-based, mission-based) impact this remote characterization is considered.

  11. Decentralized Control of Autonomous Vehicles

    Science.gov (United States)

    2003-01-01

    Autonomous Vehicles by John S. Baras, Xiaobo Tan, Pedram Hovareshti CSHCN TR 2003-8 (ISR TR 2003-14) Report Documentation Page Form ApprovedOMB No. 0704...AND SUBTITLE Decentralized Control of Autonomous Vehicles 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Decentralized Control of Autonomous Vehicles ∗ John S. Baras, Xiaobo Tan, and Pedram

  12. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  13. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  14. Investments secure supply security

    International Nuclear Information System (INIS)

    Van Baarle, D.

    2006-01-01

    In order to guarantee the supply of energy considerable investment must be made to improve the infrastructure (e.g. capacity for LNG-transport and -storage) and ties with the natural gas supplier in the Russian Federation must be intensified [nl

  15. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  16. The Autonomous Student: A Footnote.

    Science.gov (United States)

    Long, Jancis

    1987-01-01

    An argument that rationality is a learned behavior, rather than a natural facility, is developed vis-a-vis certain educational theories. The difficulties students face in maintaining a rational stance in an autonomous classroom are also discussed. (JL)

  17. Structural Discrimination and Autonomous Vehicles

    DEFF Research Database (Denmark)

    Liu, Hin-Yan

    2016-01-01

    This paper examines the potential for structural discrimination to be woven into the fabric of autonomous vehicle developments, which remain underexplored and undiscussed. The prospect for structural discrimination arises as a result of the coordinated modes of autonomous vehicle behaviour...... individual identity, and potentially relative worth, to autonomous vehicles engaging in a crash damage calculus. At the risk of introducing these ideas into the development of autonomous vehicles, this paper hopes to spark a debate to foreclose these eventualities....... that is prescribed by its code. This leads to the potential for individuated outcomes to be networked and thereby multiplied consistently to any number of vehicles implementing such a code. The aggregated effects of such algorithmic policy preferences will thus cumulate in the reallocation of benefits and burdens...

  18. Simple autonomous Mars walker

    Science.gov (United States)

    Larimer, Stanley J.; Lisec, Thomas R.; Spiessbach, Andrew J.

    1989-01-01

    Under a contract with NASA's Jet Propulsion Laboratory, Martin Marietta has developed several alternative rover concepts for unmanned exploration of the planet Mars. One of those concepts, the 'Walking Beam', is the subject of this paper. This concept was developed with the goal of achieving many of the capabilities of more sophisticated articulated-leg walkers with a much simpler, more robust, less computationally demanding and more power efficient design. It consists of two large-base tripods nested one within the other which alternately translate with respect to each other along a 5-meter beam to propel the vehicle. The semiautonomous navigation system relies on terrain geometry sensors and tacticle feedback from each foot to autonomously select a path which avoids hazards along a route designated from earth. Both mobility and navigation features of this concept are discussed including a top-level description of the vehicle's physical characteristics, deployment strategy, mobility elements, sensor suite, theory of operation, navigation and control processes, and estimated performance.

  19. Is paramecium swimming autonomic?

    Science.gov (United States)

    Bandyopadhyay, Promode R.; Toplosky, Norman; Hansen, Joshua

    2010-11-01

    We seek to explore if the swimming of paramecium has an underlying autonomic mechanism. Such robotic elements may be useful in capturing the disturbance field in an environment in real time. Experimental evidence is emerging that motion control neurons of other animals may be present in paramecium as well. The limit cycle determined using analog simulation of the coupled nonlinear oscillators of olivo-cerebellar dynamics (ieee joe 33, 563-578, 2008) agrees with the tracks of the cilium of a biological paramecium. A 4-motor apparatus has been built that reproduces the kinematics of the cilium motion. The motion of the biological cilium has been analyzed and compared with the results of the finite element modeling of forces on a cilium. The modeling equates applied torque at the base of the cilium with drag, the cilium stiffness being phase dependent. A low friction pendulum apparatus with a multiplicity of electromagnetic actuators is being built for verifying the maps of the attractor basin computed using the olivo-cerebellar dynamics for different initial conditions. Sponsored by ONR 33.

  20. AUTONOMOUS GAUSSIAN DECOMPOSITION

    Energy Technology Data Exchange (ETDEWEB)

    Lindner, Robert R.; Vera-Ciro, Carlos; Murray, Claire E.; Stanimirović, Snežana; Babler, Brian [Department of Astronomy, University of Wisconsin, 475 North Charter Street, Madison, WI 53706 (United States); Heiles, Carl [Radio Astronomy Lab, UC Berkeley, 601 Campbell Hall, Berkeley, CA 94720 (United States); Hennebelle, Patrick [Laboratoire AIM, Paris-Saclay, CEA/IRFU/SAp-CNRS-Université Paris Diderot, F-91191 Gif-sur Yvette Cedex (France); Goss, W. M. [National Radio Astronomy Observatory, P.O. Box O, 1003 Lopezville, Socorro, NM 87801 (United States); Dickey, John, E-mail: rlindner@astro.wisc.edu [University of Tasmania, School of Maths and Physics, Private Bag 37, Hobart, TAS 7001 (Australia)

    2015-04-15

    We present a new algorithm, named Autonomous Gaussian Decomposition (AGD), for automatically decomposing spectra into Gaussian components. AGD uses derivative spectroscopy and machine learning to provide optimized guesses for the number of Gaussian components in the data, and also their locations, widths, and amplitudes. We test AGD and find that it produces results comparable to human-derived solutions on 21 cm absorption spectra from the 21 cm SPectral line Observations of Neutral Gas with the EVLA (21-SPONGE) survey. We use AGD with Monte Carlo methods to derive the H i line completeness as a function of peak optical depth and velocity width for the 21-SPONGE data, and also show that the results of AGD are stable against varying observational noise intensity. The autonomy and computational efficiency of the method over traditional manual Gaussian fits allow for truly unbiased comparisons between observations and simulations, and for the ability to scale up and interpret the very large data volumes from the upcoming Square Kilometer Array and pathfinder telescopes.

  1. AUTONOMOUS GAUSSIAN DECOMPOSITION

    International Nuclear Information System (INIS)

    Lindner, Robert R.; Vera-Ciro, Carlos; Murray, Claire E.; Stanimirović, Snežana; Babler, Brian; Heiles, Carl; Hennebelle, Patrick; Goss, W. M.; Dickey, John

    2015-01-01

    We present a new algorithm, named Autonomous Gaussian Decomposition (AGD), for automatically decomposing spectra into Gaussian components. AGD uses derivative spectroscopy and machine learning to provide optimized guesses for the number of Gaussian components in the data, and also their locations, widths, and amplitudes. We test AGD and find that it produces results comparable to human-derived solutions on 21 cm absorption spectra from the 21 cm SPectral line Observations of Neutral Gas with the EVLA (21-SPONGE) survey. We use AGD with Monte Carlo methods to derive the H i line completeness as a function of peak optical depth and velocity width for the 21-SPONGE data, and also show that the results of AGD are stable against varying observational noise intensity. The autonomy and computational efficiency of the method over traditional manual Gaussian fits allow for truly unbiased comparisons between observations and simulations, and for the ability to scale up and interpret the very large data volumes from the upcoming Square Kilometer Array and pathfinder telescopes

  2. Design of Autonomous Gel Actuators

    Directory of Open Access Journals (Sweden)

    Shuji Hashimoto

    2011-01-01

    Full Text Available In this paper, we introduce autonomous gel actuators driven by chemical energy. The polymer gels prepared here have cyclic chemical reaction networks. With a cyclic reaction, the polymer gels generate periodical motion. The periodic motion of the gel is produced by the chemical energy of the oscillatory Belouzov-Zhabotinsky (BZ reaction. We have succeeded in making synthetic polymer gel move autonomously like a living organism. This experimental fact represents the great possibility of the chemical robot.

  3. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  4. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  5. Potential contribution of bioethanol fuel to the transport sector of Vojvodina

    International Nuclear Information System (INIS)

    Dodic, Sinisa N.; Popov, Stevan D.; Dodic, Jelena M.; Rankovic, Jovana A.; Zavargo, Zoltan Z.

    2009-01-01

    The Autonomous Province of Vojvodina is an Autonomous Province in Serbia and it is an energy-deficient country. The indigenous reserves of oil and gas are limited and the country is heavily dependent on the import of oil. The oil import bill is a serious strain on the country's economy and has been deteriorating the balance of payments situation. The country has become increasingly more dependent on fossil fuels and its energy security hangs on the fragile supply of imported oil that is subject to disruptions and price volatility. The transport sector has a 26% share in the total commercial energy consumption in Vojvodina. About 0.62 million tons of gasoline were consumed by this sector in 2008. Gasoline consumption in the transport sector is also a major source of environmental degradation especially in urban areas. Consequently, Vojvodina needs to develop indigenous, environment-friendly energy resources, such as bioethanol, to meet its transport sector's energy needs. Vojvodina produces about 3 million tons of sugar beet every year. There is a vast potential for bioethanol production from molasses of sugar beet in the country. Bioethanol can be used in transport sector after blending with gasoline, in order to minimize gasoline consumption and associated economical and environmental impacts. This paper presents the assessment of the potential contribution of bioethanol in the transport sector of Vojvodina. It is concluded that 20% of annual gasoline consumption in transport sector could be met from ethanol by the year 2026. (author)

  6. Rail security : some actions taken to enhance passenger and freight rail security, but significant challenges remain : testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate

    Science.gov (United States)

    2004-03-23

    Passenger and freight rail services are important links in the nation's transportation system. Terrorist attacks on passenger and/or freight rail services have the potential to cause widespread injury, loss of life, and economic disruption. The recen...

  7. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  8. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  9. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  10. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  11. Compact autonomous navigation system (CANS)

    Science.gov (United States)

    Hao, Y. C.; Ying, L.; Xiong, K.; Cheng, H. Y.; Qiao, G. D.

    2017-11-01

    Autonomous navigation of Satellite and constellation has series of benefits, such as to reduce operation cost and ground station workload, to avoid the event of crises of war and natural disaster, to increase spacecraft autonomy, and so on. Autonomous navigation satellite is independent of ground station support. Many systems are developed for autonomous navigation of satellite in the past 20 years. Along them American MANS (Microcosm Autonomous Navigation System) [1] of Microcosm Inc. and ERADS [2] [3] (Earth Reference Attitude Determination System) of Honeywell Inc. are well known. The systems anticipate a series of good features of autonomous navigation and aim low cost, integrated structure, low power consumption and compact layout. The ERADS is an integrated small 3-axis attitude sensor system with low cost and small volume. It has the Earth center measurement accuracy higher than the common IR sensor because the detected ultraviolet radiation zone of the atmosphere has a brightness gradient larger than that of the IR zone. But the ERADS is still a complex system because it has to eliminate many problems such as making of the sapphire sphere lens, birefringence effect of sapphire, high precision image transfer optical fiber flattener, ultraviolet intensifier noise, and so on. The marginal sphere FOV of the sphere lens of the ERADS is used to star imaging that may be bring some disadvantages., i.e. , the image energy and attitude measurements accuracy may be reduced due to the tilt image acceptance end of the fiber flattener in the FOV. Besides Japan, Germany and Russia developed visible earth sensor for GEO [4] [5]. Do we have a way to develop a cheaper/easier and more accurate autonomous navigation system that can be used to all LEO spacecraft, especially, to LEO small and micro satellites? To return this problem we provide a new type of the system—CANS (Compact Autonomous Navigation System) [6].

  12. Lightweight autonomous chemical identification system (LACIS)

    Science.gov (United States)

    Lozos, George; Lin, Hai; Burch, Timothy

    2012-06-01

    Smiths Detection and Intelligent Optical Systems have developed prototypes for the Lightweight Autonomous Chemical Identification System (LACIS) for the US Department of Homeland Security. LACIS is to be a handheld detection system for Chemical Warfare Agents (CWAs) and Toxic Industrial Chemicals (TICs). LACIS is designed to have a low limit of detection and rapid response time for use by emergency responders and could allow determination of areas having dangerous concentration levels and if protective garments will be required. Procedures for protection of responders from hazardous materials incidents require the use of protective equipment until such time as the hazard can be assessed. Such accurate analysis can accelerate operations and increase effectiveness. LACIS is to be an improved point detector employing novel CBRNE detection modalities that includes a militaryproven ruggedized ion mobility spectrometer (IMS) with an array of electro-resistive sensors to extend the range of chemical threats detected in a single device. It uses a novel sensor data fusion and threat classification architecture to interpret the independent sensor responses and provide robust detection at low levels in complex backgrounds with minimal false alarms. The performance of LACIS prototypes have been characterized in independent third party laboratory tests at the Battelle Memorial Institute (BMI, Columbus, OH) and indoor and outdoor field tests at the Nevada National Security Site (NNSS). LACIS prototypes will be entering operational assessment by key government emergency response groups to determine its capabilities versus requirements.

  13. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  14. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    Science.gov (United States)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  15. Autonomous Landing on Moving Platforms

    KAUST Repository

    Mendoza Chavez, Gilberto

    2016-08-01

    This thesis investigates autonomous landing of a micro air vehicle (MAV) on a nonstationary ground platform. Unmanned aerial vehicles (UAVs) and micro air vehicles (MAVs) are becoming every day more ubiquitous. Nonetheless, many applications still require specialized human pilots or supervisors. Current research is focusing on augmenting the scope of tasks that these vehicles are able to accomplish autonomously. Precise autonomous landing on moving platforms is essential for self-deployment and recovery of MAVs, but it remains a challenging task for both autonomous and piloted vehicles. Model Predictive Control (MPC) is a widely used and effective scheme to control constrained systems. One of its variants, output-feedback tube-based MPC, ensures robust stability for systems with bounded disturbances under system state reconstruction. This thesis proposes a MAV control strategy based on this variant of MPC to perform rapid and precise autonomous landing on moving targets whose nominal (uncommitted) trajectory and velocity are slowly varying. The proposed approach is demonstrated on an experimental setup.

  16. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  17. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152 RTG

    Science.gov (United States)

    2018-04-18

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  18. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Science.gov (United States)

    2018-04-01

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  19. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  20. 49 CFR 1510.7 - Air transportation advertisements and solicitations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Air transportation advertisements and solicitations. 1510.7 Section 1510.7 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE...

  1. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  2. The Bering Autonomous Target Detection

    DEFF Research Database (Denmark)

    Jørgensen, John Leif; Denver, Troelz; Betto, Maurizio

    2003-01-01

    An autonomous asteroid target detection and tracking method has been developed. The method features near omnidirectionality and focus on high speed operations and completeness of search of the near space rather than the traditional faint object search methods, employed presently at the larger...... telescopes. The method has proven robust in operation and is well suited for use onboard spacecraft. As development target for the method and the associated instrumentation the asteroid research mission Bering has been used. Onboard a spacecraft, the autonomous detection is centered around the fully...... autonomous star tracker the Advanced Stellar Compass (ASC). One feature of this instrument is that potential targets are registered directly in terms of date, right ascension, declination, and intensity, which greatly facilitates both tracking search and registering. Results from ground and inflight tests...

  3. Autonomous Industrial Mobile Manipulation (AIMM)

    DEFF Research Database (Denmark)

    Hvilshøj, Mads; Bøgh, Simon; Nielsen, Oluf Skov

    2012-01-01

    Purpose - The purpose of this paper is to provide a review of the interdisciplinary research field Autonomous Industrial Mobile Manipulation (AIMM), with an emphasis on physical implementations and applications. Design/methodology/approach - Following an introduction to AIMM, this paper investiga......Purpose - The purpose of this paper is to provide a review of the interdisciplinary research field Autonomous Industrial Mobile Manipulation (AIMM), with an emphasis on physical implementations and applications. Design/methodology/approach - Following an introduction to AIMM, this paper......; sustainability, configuration, adaptation, autonomy, positioning, manipulation and grasping, robot-robot interaction, human-robot interaction, process quality, dependability, and physical properties. Findings - The concise yet comprehensive review provides both researchers (academia) and practitioners (industry......) with a quick and gentle overview of AIMM. Furthermore, the paper identifies key open issues and promising research directions to realize real-world integration and maturation of the AIMM technology. Originality/value - This paper reviews the interdisciplinary research field Autonomous Industrial Mobile...

  4. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  5. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  6. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    Science.gov (United States)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  7. Autonomic Regulation of Splanchnic Circulation

    Directory of Open Access Journals (Sweden)

    Kathleen A Fraser

    1991-01-01

    Full Text Available The role of the autonomic nervous system in circulatory regulation of the splanchnic organs (stomach, small intestine, colon, liver, pancreas and spleen is reviewed. In general, the sympathetic nervous system is primarily involved in vasoconstriction, while the parasympathetic contributes to vasodilation. Vasoconstriction in the splanchnic circulation appears to be mediated by alpha-2 receptors and vasodilation by activation of primary afferent nerves with subsequent release of vasodilatory peptides, or by stimulation of beta-adrenergic receptors. As well, an important function of the autonomic nervous system is to provide a mechanism by which splanchnic vascular reserve can be mobilized during stress to maintain overall cardiovascular homeostasis.

  8. Political accountability and autonomous weapons

    Directory of Open Access Journals (Sweden)

    James Igoe Walsh

    2015-09-01

    Full Text Available Autonomous weapons would have the capacity to select and attack targets without direct human input. One important objection to the introduction of such weapons is that they will make it more difficult to identify and hold accountable those responsible for undesirable outcomes such as mission failures and civilian casualties. I hypothesize that individuals can modify their attribution of responsibility in predicable ways to accommodate this new technology. The results of a survey experiment are consistent with this; subjects continue to find responsible and hold accountable political and military leaders when autonomous weapons are used, but also attribute responsibility to the designers and programmers of such weapons.

  9. Discerning non-autonomous dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Clemson, Philip T.; Stefanovska, Aneta, E-mail: aneta@lancaster.ac.uk

    2014-09-30

    Structure and function go hand in hand. However, while a complex structure can be relatively safely broken down into the minutest parts, and technology is now delving into nanoscales, the function of complex systems requires a completely different approach. Here the complexity clearly arises from nonlinear interactions, which prevents us from obtaining a realistic description of a system by dissecting it into its structural component parts. At best, the result of such investigations does not substantially add to our understanding or at worst it can even be misleading. Not surprisingly, the dynamics of complex systems, facilitated by increasing computational efficiency, is now readily tackled in the case of measured time series. Moreover, time series can now be collected in practically every branch of science and in any structural scale—from protein dynamics in a living cell to data collected in astrophysics or even via social networks. In searching for deterministic patterns in such data we are limited by the fact that no complex system in the real world is autonomous. Hence, as an alternative to the stochastic approach that is predominantly applied to data from inherently non-autonomous complex systems, theory and methods specifically tailored to non-autonomous systems are needed. Indeed, in the last decade we have faced a huge advance in mathematical methods, including the introduction of pullback attractors, as well as time series methods that cope with the most important characteristic of non-autonomous systems—their time-dependent behaviour. Here we review current methods for the analysis of non-autonomous dynamics including those for extracting properties of interactions and the direction of couplings. We illustrate each method by applying it to three sets of systems typical for chaotic, stochastic and non-autonomous behaviour. For the chaotic class we select the Lorenz system, for the stochastic the noise-forced Duffing system and for the non-autonomous

  10. Gas House Autonomous System Monitoring

    Science.gov (United States)

    Miller, Luke; Edsall, Ashley

    2015-01-01

    Gas House Autonomous System Monitoring (GHASM) will employ Integrated System Health Monitoring (ISHM) of cryogenic fluids in the High Pressure Gas Facility at Stennis Space Center. The preliminary focus of development incorporates the passive monitoring and eventual commanding of the Nitrogen System. ISHM offers generic system awareness, adept at using concepts rather than specific error cases. As an enabler for autonomy, ISHM provides capabilities inclusive of anomaly detection, diagnosis, and abnormality prediction. Advancing ISHM and Autonomous Operation functional capabilities enhances quality of data, optimizes safety, improves cost effectiveness, and has direct benefits to a wide spectrum of aerospace applications.

  11. Discerning non-autonomous dynamics

    International Nuclear Information System (INIS)

    Clemson, Philip T.; Stefanovska, Aneta

    2014-01-01

    Structure and function go hand in hand. However, while a complex structure can be relatively safely broken down into the minutest parts, and technology is now delving into nanoscales, the function of complex systems requires a completely different approach. Here the complexity clearly arises from nonlinear interactions, which prevents us from obtaining a realistic description of a system by dissecting it into its structural component parts. At best, the result of such investigations does not substantially add to our understanding or at worst it can even be misleading. Not surprisingly, the dynamics of complex systems, facilitated by increasing computational efficiency, is now readily tackled in the case of measured time series. Moreover, time series can now be collected in practically every branch of science and in any structural scale—from protein dynamics in a living cell to data collected in astrophysics or even via social networks. In searching for deterministic patterns in such data we are limited by the fact that no complex system in the real world is autonomous. Hence, as an alternative to the stochastic approach that is predominantly applied to data from inherently non-autonomous complex systems, theory and methods specifically tailored to non-autonomous systems are needed. Indeed, in the last decade we have faced a huge advance in mathematical methods, including the introduction of pullback attractors, as well as time series methods that cope with the most important characteristic of non-autonomous systems—their time-dependent behaviour. Here we review current methods for the analysis of non-autonomous dynamics including those for extracting properties of interactions and the direction of couplings. We illustrate each method by applying it to three sets of systems typical for chaotic, stochastic and non-autonomous behaviour. For the chaotic class we select the Lorenz system, for the stochastic the noise-forced Duffing system and for the non-autonomous

  12. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  13. Robotic security vehicle for exterior environments

    International Nuclear Information System (INIS)

    Klarer, P.R.; Workhoven, R.M.

    1988-01-01

    This paper describes a current effort at Sandia National Labs to develop an outdoor robotic vehicle capable of performing limited security functions autonomously in a structured environment. The present stage of development entails application of algorithms originally developed for the SIR vehicle to a testbed vehicle more appropriate to an outdoor environment. The current effort will culminate in a full scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. Various schemes for implementation of the robot system are discussed, as are plans for further development of the system

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Autonomic dysfunction in cirrhosis and portal hypertension

    DEFF Research Database (Denmark)

    Dümcke, Christine Winkler; Møller, Søren

    2008-01-01

    Liver cirrhosis and portal hypertension are frequently associated with signs of circulatory dysfunction and peripheral polyneuropathy, which includes defects of the autonomic nervous system. Autonomic dysfunction, which is seen in both alcoholic and non-alcoholic liver cirrhosis and increases...

  17. Energy homeostasis, autonomic activity and obesity

    NARCIS (Netherlands)

    Scheurink, AJW; Balkan, B; Nyakas, C; vanDijk, G; Steffens, AB; Bohus, B

    1995-01-01

    Obesity is often accompanied by alterations in both sympathetic and parasympathetic autonomic functions. The present paper summarizes the results of a number of studies designed to investigate autonomic functioning in normal, genetically, and experimentally obese rats, Particular emphasis is given

  18. Responsibility for crashes of autonomous vehicles: an ethical analysis.

    Science.gov (United States)

    Hevelke, Alexander; Nida-Rümelin, Julian

    2015-06-01

    A number of companies including Google and BMW are currently working on the development of autonomous cars. But if fully autonomous cars are going to drive on our roads, it must be decided who is to be held responsible in case of accidents. This involves not only legal questions, but also moral ones. The first question discussed is whether we should try to design the tort liability for car manufacturers in a way that will help along the development and improvement of autonomous vehicles. In particular, Patrick Lin's concern that any security gain derived from the introduction of autonomous cars would constitute a trade-off in human lives will be addressed. The second question is whether it would be morally permissible to impose liability on the user based on a duty to pay attention to the road and traffic and to intervene when necessary to avoid accidents. Doubts about the moral legitimacy of such a scheme are based on the notion that it is a form of defamation if a person is held to blame for causing the death of another by his inattention if he never had a real chance to intervene. Therefore, the legitimacy of such an approach would depend on the user having an actual chance to do so. The last option discussed in this paper is a system in which a person using an autonomous vehicle has no duty (and possibly no way) of interfering, but is still held (financially, not criminally) responsible for possible accidents. Two ways of doing so are discussed, but only one is judged morally feasible.

  19. Mining in the Future: Autonomous Robotics for Safer Mines

    CSIR Research Space (South Africa)

    Shahdi, A

    2012-10-01

    Full Text Available ? Require less support infrastructure ? Advanced sensors ? CSIR 2012 Slide 4 Degree of Autonomy ? Teleoperation ? Semi-autonomous ? Autonomous ? CSIR 2012 Slide 5 Mobile Intelligent Autonomous Systems Group ? The Mobile Intelligent Autonomous...

  20. Formal Verification of Autonomous Vehicle Platooning

    OpenAIRE

    Kamali, Maryam; Dennis, Louise A.; McAree, Owen; Fisher, Michael; Veres, Sandor M.

    2016-01-01

    The coordination of multiple autonomous vehicles into convoys or platoons is expected on our highways in the near future. However, before such platoons can be deployed, the new autonomous behaviors of the vehicles in these platoons must be certified. An appropriate representation for vehicle platooning is as a multi-agent system in which each agent captures the "autonomous decisions" carried out by each vehicle. In order to ensure that these autonomous decision-making agents in vehicle platoo...

  1. Hazard Map for Autonomous Navigation

    DEFF Research Database (Denmark)

    Riis, Troels

    This dissertation describes the work performed in the area of using image analysis in the process of landing a spacecraft autonomously and safely on the surface of the Moon. This is suggested to be done using a Hazard Map. The correspondence problem between several Hazard Maps are investigated...

  2. Designing Assessment for Autonomous Learning

    Science.gov (United States)

    Hay, Marie; Mathers, Lucy

    2012-01-01

    This paper aims to disseminate and evaluate an autonomous learning framework developed through collaborative research with first- and second-year undergraduate students at De Montfort University. Central to the framework is the involvement of students in the assessment of their peers and themselves using dialogue about the assessment and feedback…

  3. Computing architecture for autonomous microgrids

    Science.gov (United States)

    Goldsmith, Steven Y.

    2015-09-29

    A computing architecture that facilitates autonomously controlling operations of a microgrid is described herein. A microgrid network includes numerous computing devices that execute intelligent agents, each of which is assigned to a particular entity (load, source, storage device, or switch) in the microgrid. The intelligent agents can execute in accordance with predefined protocols to collectively perform computations that facilitate uninterrupted control of the .

  4. Autonomous Landing on Moving Platforms

    KAUST Repository

    Mendoza Chavez, Gilberto

    2016-01-01

    -deployment and recovery of MAVs, but it remains a challenging task for both autonomous and piloted vehicles. Model Predictive Control (MPC) is a widely used and effective scheme to control constrained systems. One of its variants, output-feedback tube-based MPC, ensures

  5. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  6. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  7. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  8. Autonomous Navigation and Obstacle Avoidance of a Micro-Bus

    Directory of Open Access Journals (Sweden)

    Carlos Fernández

    2013-04-01

    Full Text Available At present, the topic of automated vehicles is one of the most promising research areas in the field of Intelligent Transportation Systems (ITS. The use of automated vehicles for public transportation also contributes to reductions in congestion levels and to improvements in traffic flow. Moreover, electrical public autonomous vehicles are environmentally friendly, provide better air quality and contribute to energy conservation. The driverless public transportation systems, which are at present operating in some airports and train stations, are restricted to dedicated roads and exhibit serious trouble dynamically avoiding obstacles in the trajectory. In this paper, an electric autonomous mini-bus is presented. All datasets used in this article were collected during the experiments carried out in the demonstration event of the 2012 IEEE Intelligent Vehicles Symposium that took place in Alcalá de Henares (Spain. The demonstration consisted of a route 725 metres long containing a list of latitude-longitude points (waypoints. The mini-bus was capable of driving autonomously from one waypoint to another using a GPS sensor. Furthermore, the vehicle is provided with a multi-beam Laser Imaging Detection and Ranging (LIDAR sensor for surrounding reconstruction and obstacle detection. When an obstacle is detected in the planned path, the planned route is modified in order to avoid the obstacle and continue its way to the end of the mission. On the demonstration day, a total of 196 attendees had the opportunity to get a ride on the vehicles. A total of 28 laps were successfully completed in full autonomous mode in a private circuit located in the National Institute for Aerospace Research (INTA, Spain. In other words, the system completed 20.3 km of driverless navigation and obstacle avoidance.

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  11. Coal Mines Security System

    OpenAIRE

    Ankita Guhe; Shruti Deshmukh; Bhagyashree Borekar; Apoorva Kailaswar; Milind E.Rane

    2012-01-01

    Geological circumstances of mine seem to be extremely complicated and there are many hidden troubles. Coal is wrongly lifted by the musclemen from coal stocks, coal washeries, coal transfer and loading points and also in the transport routes by malfunctioning the weighing of trucks. CIL —Coal India Ltd is under the control of mafia and a large number of irregularities can be contributed to coal mafia. An Intelligent Coal Mine Security System using data acquisition method utilizes sensor, auto...

  12. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  13. Autonomous Cryogenics Loading Operations Simulation Software: Knowledgebase Autonomous Test Engineer

    Science.gov (United States)

    Wehner, Walter S., Jr.

    2013-01-01

    Working on the ACLO (Autonomous Cryogenics Loading Operations) project I have had the opportunity to add functionality to the physics simulation software known as KATE (Knowledgebase Autonomous Test Engineer), create a new application allowing WYSIWYG (what-you-see-is-what-you-get) creation of KATE schematic files and begin a preliminary design and implementation of a new subsystem that will provide vision services on the IHM (Integrated Health Management) bus. The functionality I added to KATE over the past few months includes a dynamic visual representation of the fluid height in a pipe based on number of gallons of fluid in the pipe and implementing the IHM bus connection within KATE. I also fixed a broken feature in the system called the Browser Display, implemented many bug fixes and made changes to the GUI (Graphical User Interface).

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  16. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  17. Morphologic Changes in Autonomic Nerves in Diabetic Autonomic Neuropathy

    Directory of Open Access Journals (Sweden)

    Heung Yong Jin

    2015-12-01

    Full Text Available Diabetic neuropathy is one of the major complications of diabetes, and it increases morbidity and mortality in patients with both type 1 diabetes mellitus (T1DM and type 2 diabetes mellitus (T2DM. Because the autonomic nervous system, for example, parasympathetic axons, has a diffuse and wide distribution, we do not know the morphological changes that occur in autonomic neural control and their exact mechanisms in diabetic patients with diabetic autonomic neuropathy (DAN. Although the prevalence of sympathetic and parasympathetic neuropathy is similar in T1DM versus T2DM patients, sympathetic nerve function correlates with parasympathetic neuropathy only in T1DM patients. The explanation for these discrepancies might be that parasympathetic nerve function was more severely affected among T2DM patients. As parasympathetic nerve damage seems to be more advanced than sympathetic nerve damage, it might be that parasympathetic neuropathy precedes sympathetic neuropathy in T2DM, which was Ewing's concept. This could be explained by the intrinsic morphologic difference. Therefore, the morphological changes in the sympathetic and parasympathetic nerves of involved organs in T1DM and T2DM patients who have DAN should be evaluated. In this review, evaluation methods for morphological changes in the epidermal nerves of skin, and the intrinsic nerves of the stomach will be discussed.

  18. 49 CFR 8.9 - Information Security Review Committee.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  19. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  20. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. Insights into the background of autonomic medicine.

    Science.gov (United States)

    Laranjo, Sérgio; Geraldes, Vera; Oliveira, Mário; Rocha, Isabel

    2017-10-01

    Knowledge of the physiology underlying the autonomic nervous system is pivotal for understanding autonomic dysfunction in clinical practice. Autonomic dysfunction may result from primary modifications of the autonomic nervous system or be secondary to a wide range of diseases that cause severe morbidity and mortality. Together with a detailed history and physical examination, laboratory assessment of autonomic function is essential for the analysis of various clinical conditions and the establishment of effective, personalized and precise therapeutic schemes. This review summarizes the main aspects of autonomic medicine that constitute the background of cardiovascular autonomic dysfunction. Copyright © 2017 Sociedade Portuguesa de Cardiologia. Publicado por Elsevier España, S.L.U. All rights reserved.

  3. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  4. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  5. Cardiovascular autonomic neuropathy in diabetes

    DEFF Research Database (Denmark)

    Spallone, Vincenza; Ziegler, Dan; Freeman, Roy

    2011-01-01

    Cardiovascular Autonomic Neuropathy (CAN) Subcommittee of Toronto Consensus Panel on Diabetic Neuropathy worked to update CAN guidelines, with regard to epidemiology, clinical impact, diagnosis, usefulness of CAN testing, and management. CAN is the impairment of cardiovascular autonomic control...... in type 2 diabetes. CAN is a risk marker of mortality and cardiovascular morbidity, and possibly a progression promoter of diabetic nephropathy. Criteria for CAN diagnosis and staging are: 1. one abnormal cardio-vagal test identifies possible or early CAN; 2. at least two abnormal cardio-vagal tests....... diagnosis of CAN clinical forms, 2. detection and tailored treatment of CAN clinical correlates (e.g. tachycardia, OH, nondipping, QT interval prolongation), 3. risk stratification for diabetic complications and cardiovascular morbidity and mortality, and 4. modulation of targets of diabetes therapy...

  6. Autonomous Laser-Powered Vehicle

    Science.gov (United States)

    Stone, William C. (Inventor); Hogan, Bartholomew P. (Inventor)

    2017-01-01

    An autonomous laser-powered vehicle designed to autonomously penetrate through ice caps of substantial (e.g., kilometers) thickness by melting a path ahead of the vehicle as it descends. A high powered laser beam is transmitted to the vehicle via an onboard bare fiber spooler. After the beam enters through the dispersion optics, the beam expands into a cavity. A radiation shield limits backscatter radiation from heating the optics. The expanded beam enters the heat exchanger and is reflected by a dispersion mirror. Forward-facing beveled circular grooves absorb the reflected radiant energy preventing the energy from being reflected back towards the optics. Microchannels along the inner circumference of the beam dump heat exchanger maximize heat transfer. Sufficient amount of fiber is wound on the fiber spooler to permit not only a descent but also to permit a sample return mission by inverting the vehicle and melting its way back to the surface.

  7. Health, autonomic financing and transferences

    Directory of Open Access Journals (Sweden)

    David Cantarero Prieto

    2002-01-01

    Full Text Available The present paper has as objective to study the whole relative problem to the autonomous communities and regional heath care expenditure financing in Spain. This article has a dual purpose. First, the financing of the current health care attendance is approached in the Spanish regions passing magazine to its possible variants and we observe that the balance of our system is clearly inclined towards the side of the integration in the general pattern of financing («Fiscal Room» with specific conditions («Mixed System». Secondly, we examine the new situation in the mark of health care and its corresponding financing in the new model approved in 2001, in terms of the effects of tax assignment on autonomous communities.

  8. Autonomously managed high power systems

    International Nuclear Information System (INIS)

    Weeks, D.J.; Bechtel, R.T.

    1985-01-01

    The need for autonomous power management capabilities will increase as the power levels of spacecraft increase into the multi-100 kW range. The quantity of labor intensive ground and crew support consumed by the 9 kW Skylab cannot be afforded in support of a 75-300 kW Space Station or high power earth orbital and interplanetary spacecraft. Marshall Space Flight Center is managing a program to develop necessary technologies for high power system autonomous management. To date a reference electrical power system and automation approaches have been defined. A test facility for evaluation and verification of management algorithms and hardware has been designed with the first of the three power channel capability nearing completion

  9. Development of autonomous operation system

    International Nuclear Information System (INIS)

    Endou, Akira; Watanabe, Kenshiu; Miki, Tetsushi

    1992-01-01

    To enhance operation reliability of nuclear plants by removing human factors, study on an autonomous operation system has been carried out to substitute artificial intelligence (AI) for plant operators and, in addition, traditional controllers used in existing plants. For construction of the AI system, structurization of knowledge on the basis of the principles such as physical laws, function and structure of relevant objects and generalization of problem solving process are intended. A hierarchical distributed cooperative system configuration in employed because it is superior from the viewpoint of dynamical reorganization of system functions. This configuration is realized by an object-oriented multi-agent system. Construction of a prototype system was planned and the conceptual design was made for FBR plant in order to evaluate applicability of AI to the autonomous operation and to have a prospect for the realization of the system. The prototype system executes diagnosis, state evaluation, operation and control for the main plant subsystems. (author)

  10. Autonomous Agents as Artistic Collaborators

    DEFF Research Database (Denmark)

    Kadish, David

    In this paper, I ask whether it is possible to exert creative direction on the emergence of large scale patterns from the actions of autonomous or semi-autonomous actors. As an artist and an engineer, I undertake installations and projects with an intent to create, to make art or innovative...... structures. At the same time, one of my artistic interests is in ceding a great deal of creative control to a cluster of robotic actors, in the process interrogating the lack of control that we, as a species, exert over the world. Here, I explore this idea in the context of an ongoing project called...... that navigate the space as well. My work has implications for how we as a species address planetary-scale challenges and whether we can organize societies to find emergent solutions to complex problems. Behind my artistic interest is the idea that "creation" has no teleological impulse. The creative force from...

  11. Enabling technologies for the prassi autonomous robot

    Energy Technology Data Exchange (ETDEWEB)

    Taraglio, S.; Nanni, V. [ENEA, Robotics and Information Technology Division, Rome (Italy)

    2001-07-01

    In this book are summarised some of the results of the PRASSI project as presented by the different partners of the effort. PRASSI is an acronym which stands for Autonomous Robotic Platform for the Security and Surveillance of plants, the Italian for it is 'Piattaforma Robotica per la Sorveglianza e Sicurezza d'Impianto'. This project has been funded by the Italian Ministry for the Education, the University and the Research (MIUR) in the framework of the project High Performance Computing Applied to Robotics (Calcolo Parallelo con Applicazioni alla Robotica) of the law 95/1995. The idea behind such an initiative is that of fostering the knowledge and possibly the use of high performance computing in the research and industrial community. In other words, robotic scientists are always simplifying their algorithms or using particular approaches (e.g. soft computing) in order to use standard processors for difficult sensorial data processing; well, what if an embedded parallel computer were available, with at least one magnitude more of computing power?.

  12. Enabling technologies for the prassi autonomous robot

    Energy Technology Data Exchange (ETDEWEB)

    Taraglio, S; Nanni, V [ENEA, Robotics and Information Technology Division, Rome (Italy)

    2001-07-01

    In this book are summarised some of the results of the PRASSI project as presented by the different partners of the effort. PRASSI is an acronym which stands for Autonomous Robotic Platform for the Security and Surveillance of plants, the Italian for it is 'Piattaforma Robotica per la Sorveglianza e Sicurezza d'Impianto'. This project has been funded by the Italian Ministry for the Education, the University and the Research (MIUR) in the framework of the project High Performance Computing Applied to Robotics (Calcolo Parallelo con Applicazioni alla Robotica) of the law 95/1995. The idea behind such an initiative is that of fostering the knowledge and possibly the use of high performance computing in the research and industrial community. In other words, robotic scientists are always simplifying their algorithms or using particular approaches (e.g. soft computing) in order to use standard processors for difficult sensorial data processing; well, what if an embedded parallel computer were available, with at least one magnitude more of computing power?.

  13. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  14. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  15. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  16. Autonomous spacecraft rendezvous and docking

    Science.gov (United States)

    Tietz, J. C.; Almand, B. J.

    A storyboard display is presented which summarizes work done recently in design and simulation of autonomous video rendezvous and docking systems for spacecraft. This display includes: photographs of the simulation hardware, plots of chase vehicle trajectories from simulations, pictures of the docking aid including image processing interpretations, and drawings of the control system strategy. Viewgraph-style sheets on the display bulletin board summarize the simulation objectives, benefits, special considerations, approach, and results.

  17. Biology-Inspired Autonomous Control

    Science.gov (United States)

    2011-08-31

    insect brain, allow these animals to fly with damaged wings, order of body mass payloads (e.g., foraging bees with a load of pollen , blood satiated...The research focus addressed two broad, complementary research areas : autonomous systems concepts inspired by the behavior and neurobiology...UL 46 19b. TELEPHONE NUMBER (include area code) 850 883-1887 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 iii Table of

  18. Autonomous Electrical Vehicles’ Charging Station

    OpenAIRE

    Józef Paska; Mariusz Kłos; Łukasz Rosłaniec; Rafał Bielas; Magdalena Błędzińska

    2016-01-01

    This paper presents a model of an autonomous electrical vehicles’ charging station. It consists of renewable energy sources: wind turbine system, photovoltaic cells, as well as an energy storage, load, and EV charging station. In order to optimise the operating conditions, power electronic converters were added to the system. The model was implemented in the Homer Energy programme. The first part of the paper presents the design assumptions and technological solutions. Further in the paper...

  19. Urban planning for autonomous vehicles

    OpenAIRE

    Fourie, Pieter J.; Ordoñez Medina, Sergio A.; Maheshwari, Tanvi; Wang, Biyu; Erath, Alexander; Cairns, Stephen; Axhausen, Kay W.

    2018-01-01

    In land-scarce Singapore, population growth and increasingly dense development are running up against limited remaining space for mobility infrastructure expansion. Autonomous Vehicles (AV) promise to relieve some of this pressure, through more efficient use of road space through platooning and intersection coordination, reducing the need for parking space, and reducing overall reliance on privately owned cars, realising Singapore’s vision of a “car-lite” future. In a collaborative resear...

  20. Failure Prediction for Autonomous Driving

    OpenAIRE

    Hecker, Simon; Dai, Dengxin; Van Gool, Luc

    2018-01-01

    The primary focus of autonomous driving research is to improve driving accuracy. While great progress has been made, state-of-the-art algorithms still fail at times. Such failures may have catastrophic consequences. It therefore is important that automated cars foresee problems ahead as early as possible. This is also of paramount importance if the driver will be asked to take over. We conjecture that failures do not occur randomly. For instance, driving models may fail more likely at places ...

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  2. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  3. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  4. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  5. Autonomic neuropathy in diabetes mellitus

    Directory of Open Access Journals (Sweden)

    Alberto eVerrotti

    2014-12-01

    Full Text Available Diabetic autonomic neuropathy (DAN is a serious and common complication of diabetes, often overlooked and misdiagnosed. It is a systemic-wide disorder that may be asymptomatic in the early stages. The most studied and clinically important form of DAN is cardiovascular autonomic neuropathy (CAN defined as the impairment of autonomic control of the cardiovascular system in patients with diabetes after exclusion of other causes. The reported prevalence of DAN varies widely depending on inconsistent definition, different diagnostic method, different patient cohorts studied. The pathogenesis is still unclear and probably multifactorial. Once DAN becomes clinically evident, no form of therapy has been identified which can effectively stop or reverse it. Prevention strategies are based on strict glycemic control with intensive insulin treatment, multifactorial intervention and lifestyle modification including control of hypertension, dyslipidemia, stop smoking, weight loss and adequate physical exercise. The present review summarizes the latest knowledge regarding clinical presentation, epidemiology, pathogenesis and management of DAN, with some mention to childhood and adolescent population.

  6. High security ion-lithium batteries with rapid recharge for the terrestrial transport and energy storage; Batteries de type ion-lithium de haute securite a recharge rapide pour le transport terrestre et le stockage d'energie

    Energy Technology Data Exchange (ETDEWEB)

    Zaghib, Karim; Dontigny, M.; Charest, P.; Guerfi, A.; Trotier, J.; Mathieu, M.C.; Zhu, W.; Petitclerc, M.; Veillette, R.; Serventi, A.; Hovington, P.; Lagace, M.; Trudeau, M.; Vijh, A.

    2010-09-15

    Electrical terrestrial transport is today a hub of innovation and growth for Hydro-Quebec. In the perspective of electrification of terrestrial transports, battery remains the critical factor of future success of rechargeable electrical vehicles. For nearly 20 years, Hydro-Quebec, via its research institute, has worked at developing battery material for the lithium-ion technology. Two types of Li-ion batteries have been developed: the energy battery and the power battery. [French] Le transport terrestre electrique est aujourd'hui un pole d'innovation et de croissance pour Hydro-Quebec. Dans la perspective de l'electrification des transports terrestres, la batterie demeure le facteur critique du succes futur des vehicules electriques rechargeables. Depuis pres de 20 ans, Hydro-Quebec, par le biais de son Institut de recherche, travaille au developpement de materiaux de batteries destinees a la technologie lithium-ion. Deux types de batteries Li-ion ont ete mises au point : la batterie d'energie et la batterie de puissance.

  7. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. Transport of MOX fuel

    International Nuclear Information System (INIS)

    Porter, I.R.; Carr, M.

    1997-01-01

    The regulatory framework which governs the transport of MOX fuel is set out, including packages, transport modes and security requirements. Technical requirements for the packages are reviewed and BNFL's experience in plutonium and MOX fuel transport is described. The safety of such operations and the public perception of safety are described and the question of gaining public acceptance for MOX fuel transport is addressed. The paper concludes by emphasising the need for proactive programmes to improve the public acceptance of these operations. (Author)

  10. Radioactive materials transport

    International Nuclear Information System (INIS)

    Talbi, B.

    1996-01-01

    The development of peaceful applications of nuclear energy results in the increase of transport operations of radioactive materials. Therefore strong regulations on transport of radioactive materials turns out to be a necessity in Tunisia. This report presents the different axes of regulations which include the means of transport involved, the radiation protection of the carriers, the technical criteria of security in transport, the emergency measures in case of accidents and penalties in case of infringement. (TEC). 12 refs., 1 fig

  11. Security Infrastructure and Applicationsfor Mobile Agents

    OpenAIRE

    Shibli, Awais

    2010-01-01

    Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network...

  12. Autonomous Cryogenic Load Operations: Knowledge-Based Autonomous Test Engineer

    Science.gov (United States)

    Schrading, J. Nicolas

    2013-01-01

    The Knowledge-Based Autonomous Test Engineer (KATE) program has a long history at KSC. Now a part of the Autonomous Cryogenic Load Operations (ACLO) mission, this software system has been sporadically developed over the past 20 years. Originally designed to provide health and status monitoring for a simple water-based fluid system, it was proven to be a capable autonomous test engineer for determining sources of failure in the system. As part of a new goal to provide this same anomaly-detection capability for a complicated cryogenic fluid system, software engineers, physicists, interns and KATE experts are working to upgrade the software capabilities and graphical user interface. Much progress was made during this effort to improve KATE. A display of the entire cryogenic system's graph, with nodes for components and edges for their connections, was added to the KATE software. A searching functionality was added to the new graph display, so that users could easily center their screen on specific components. The GUI was also modified so that it displayed information relevant to the new project goals. In addition, work began on adding new pneumatic and electronic subsystems into the KATE knowledge base, so that it could provide health and status monitoring for those systems. Finally, many fixes for bugs, memory leaks, and memory errors were implemented and the system was moved into a state in which it could be presented to stakeholders. Overall, the KATE system was improved and necessary additional features were added so that a presentation of the program and its functionality in the next few months would be a success.

  13. Autonomous Cryogenic Load Operations: KSC Autonomous Test Engineer

    Science.gov (United States)

    Shrading, Nicholas J.

    2012-01-01

    The KSC Autonomous Test Engineer (KATE) program has a long history at KSC. Now a part of the Autonomous Cryogenic Load Operations (ACLO) mission, this software system has been sporadically developed over the past 20+ years. Originally designed to provide health and status monitoring for a simple water-based fluid system, it was proven to be a capable autonomous test engineer for determining sources of failure in. the system, As part.of a new goal to provide this same anomaly-detection capability for a complicated cryogenic fluid system, software engineers, physicists, interns and KATE experts are working to upgrade the software capabilities and graphical user interface. Much progress was made during this effort to improve KATE. A display ofthe entire cryogenic system's graph, with nodes for components and edges for their connections, was added to the KATE software. A searching functionality was added to the new graph display, so that users could easily center their screen on specific components. The GUI was also modified so that it displayed information relevant to the new project goals. In addition, work began on adding new pneumatic and electronic subsystems into the KATE knowledgebase, so that it could provide health and status monitoring for those systems. Finally, many fixes for bugs, memory leaks, and memory errors were implemented and the system was moved into a state in which it could be presented to stakeholders. Overall, the KATE system was improved and necessary additional features were added so that a presentation of the program and its functionality in the next few months would be a success.

  14. An operational perspective of challenging statistical dogma while establishing a modern, secure distributed data management and imaging transport system: the Pediatric Brain Tumor Consortium phase I experience.

    Science.gov (United States)

    Onar, Arzu; Ramamurthy, Uma; Wallace, Dana; Boyett, James M

    2009-04-01

    The Pediatric Brain Tumor Consortium (PBTC) is a multidisciplinary cooperative research organization devoted to the study of correlative tumor biology and new therapies for primary central nervous system (CNS) tumors of childhood. The PBTC was created in 1999 to conduct early-phase studies in a rapid fashion in order to provide sound scientific foundation for the Children's Oncology Group to conduct definitive trials. The Operations and Biostatistics Center (OBC) of the PBTC is responsible for centrally administering study design and trial development, study conduct and monitoring, data collection and management as well as various regulatory and compliance processes. The phase I designs utilized for the consortium trials have accommodated challenges unique to pediatric trials such as body surface area (BSA)-based dosing in the absence of pediatric formulations of oral agents. Further during the past decade, the OBC has developed and implemented a state-of-the-art secure and efficient internet-based paperless distributed data management system. Additional web-based systems are also in place for tracking and distributing correlative study data as well as neuroimaging files. These systems enable effective communications among the members of the consortium and facilitate the conduct and timely reporting of multi-institutional early-phase clinical trials.

  15. Grants by Legislation of the RF Subjects for Citizens having Children (Omsk region and Khanty-Mansi autonomous district – Yugra

    Directory of Open Access Journals (Sweden)

    Sokolova N. A.

    2012-05-01

    Full Text Available The article is devoted to the analysis of Khanty-Mansi autonomous region – Yugra and the Omsk Region normative-legal acts in the social security sphere of citizens having children. The most important differences were distinguished in the social security levels of the families of these subjects of the Russian Federation

  16. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  17. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  18. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  19. Human Supervision of Multiple Autonomous Vehicles

    Science.gov (United States)

    2013-03-22

    AFRL-RH-WP-TR-2013-0143 HUMAN SUPERVISION OF MULTIPLE AUTONOMOUS VEHICLES Heath A. Ruff Ball...REPORT TYPE Interim 3. DATES COVERED (From – To) 09-16-08 – 03-22-13 4. TITLE AND SUBTITLE HUMAN SUPERVISION OF MULTIPLE AUTONOMOUS VEHICLES 5a...Supervision of Multiple Autonomous Vehicles To support the vision of a system that enables a single operator to control multiple next-generation

  20. The treatment of autonomic dysfunction in tetanus

    Directory of Open Access Journals (Sweden)

    T van den Heever

    2017-07-01

    Full Text Available We report a case of generalised tetanus in a 50-year-old female patient after sustaining a wound to her right lower leg. She developed autonomic dysfunction, which included labile hypertension alternating with hypotension and sweating. The autonomic dysfunction was treated successfully with a combination of morphine sulphate infusion, magnesium sulphate, and clonidine. She also received adrenaline and phenylephrine infusions as needed for hypotension. We then discuss the pathophysiology, clinical features and treatment options of autonomic dysfunction.

  1. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  2. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  3. Public Health, Ethics, and Autonomous Vehicles.

    Science.gov (United States)

    Fleetwood, Janet

    2017-04-01

    With the potential to save nearly 30 000 lives per year in the United States, autonomous vehicles portend the most significant advance in auto safety history by shifting the focus from minimization of postcrash injury to collision prevention. I have delineated the important public health implications of autonomous vehicles and provided a brief analysis of a critically important ethical issue inherent in autonomous vehicle design. The broad expertise, ethical principles, and values of public health should be brought to bear on a wide range of issues pertaining to autonomous vehicles.

  4. A Generic Architecture for Autonomous Uninhabited Vehicles

    National Research Council Canada - National Science Library

    Barbier, Magali; Gabard, Jean-Francois; Ayreault, Herve

    2007-01-01

    ...; few solutions propose architecture adaptive to several types of platform. Autonomous vehicles that move in partially known and dynamic environments have to deal with asynchronous disruptive events...

  5. Research Institute for Autonomous Precision Guided Systems

    National Research Council Canada - National Science Library

    Rogacki, John R

    2007-01-01

    ... actuators, development of a visualization lab for modeling vision based guidance algorithms, concept development of a rapid prototyping and aero characterization lab, vision based control of autonomous...

  6. Autonomous Real Time Requirements Tracing

    Science.gov (United States)

    Plattsmier, George; Stetson, Howard

    2014-01-01

    One of the more challenging aspects of software development is the ability to verify and validate the functional software requirements dictated by the Software Requirements Specification (SRS) and the Software Detail Design (SDD). Insuring the software has achieved the intended requirements is the responsibility of the Software Quality team and the Software Test team. The utilization of Timeliner-TLX(sup TM) Auto- Procedures for relocating ground operations positions to ISS automated on-board operations has begun the transition that would be required for manned deep space missions with minimal crew requirements. This transition also moves the auto-procedures from the procedure realm into the flight software arena and as such the operational requirements and testing will be more structured and rigorous. The autoprocedures would be required to meet NASA software standards as specified in the Software Safety Standard (NASASTD- 8719), the Software Engineering Requirements (NPR 7150), the Software Assurance Standard (NASA-STD-8739) and also the Human Rating Requirements (NPR-8705). The Autonomous Fluid Transfer System (AFTS) test-bed utilizes the Timeliner-TLX(sup TM) Language for development of autonomous command and control software. The Timeliner-TLX(sup TM) system has the unique feature of providing the current line of the statement in execution during real-time execution of the software. The feature of execution line number internal reporting unlocks the capability of monitoring the execution autonomously by use of a companion Timeliner-TLX(sup TM) sequence as the line number reporting is embedded inside the Timeliner-TLX(sup TM) execution engine. This negates I/O processing of this type data as the line number status of executing sequences is built-in as a function reference. This paper will outline the design and capabilities of the AFTS Autonomous Requirements Tracker, which traces and logs SRS requirements as they are being met during real-time execution of the

  7. Autonomous sensor manager agents (ASMA)

    Science.gov (United States)

    Osadciw, Lisa A.

    2004-04-01

    Autonomous sensor manager agents are presented as an algorithm to perform sensor management within a multisensor fusion network. The design of the hybrid ant system/particle swarm agents is described in detail with some insight into their performance. Although the algorithm is designed for the general sensor management problem, a simulation example involving 2 radar systems is presented. Algorithmic parameters are determined by the size of the region covered by the sensor network, the number of sensors, and the number of parameters to be selected. With straight forward modifications, this algorithm can be adapted for most sensor management problems.

  8. Autonomously managed electrical power systems

    Science.gov (United States)

    Callis, Charles P.

    1986-01-01

    The electric power systems for future spacecraft such as the Space Station will necessarily be more sophisticated and will exhibit more nearly autonomous operation than earlier spacecraft. These new power systems will be more reliable and flexible than their predecessors offering greater utility to the users. Automation approaches implemented on various power system breadboards are investigated. These breadboards include the Hubble Space Telescope power system test bed, the Common Module Power Management and Distribution system breadboard, the Autonomusly Managed Power System (AMPS) breadboard, and the 20 kilohertz power system breadboard. Particular attention is given to the AMPS breadboard. Future plans for these breadboards including the employment of artificial intelligence techniques are addressed.

  9. Autonomous quality assurance and troubleshooting

    Science.gov (United States)

    DuPlain, Ronald F.; Radziwill, Nicole M.; Shelton, Amy L.

    2006-06-01

    To improve operational availability (the proportion of time that a telescope is able to accomplish what a visiting observer wants at the time the observation is scheduled), response time to faults must be minimized. One way this can be accomplished is by characterizing the relationships and interdependencies between components in a control system, developing algorithms to identify the root cause of a problem, and capturing expert knowledge of a system to simplify the process of troubleshooting. Results from a prototype development are explained, along with deployment issues. Implications for the future, such as effective knowledge representation and management, and learning processes which integrate autonomous and interactive components, are discussed.

  10. Artificial Intelligence in Autonomous Telescopes

    Science.gov (United States)

    Mahoney, William; Thanjavur, Karun

    2011-03-01

    Artificial Intelligence (AI) is key to the natural evolution of today's automated telescopes to fully autonomous systems. Based on its rapid development over the past five decades, AI offers numerous, well-tested techniques for knowledge based decision making essential for real-time telescope monitoring and control, with minimal - and eventually no - human intervention. We present three applications of AI developed at CFHT for monitoring instantaneous sky conditions, assessing quality of imaging data, and a prototype for scheduling observations in real-time. Closely complementing the current remote operations at CFHT, we foresee further development of these methods and full integration in the near future.

  11. Topological entropy of autonomous flows

    Energy Technology Data Exchange (ETDEWEB)

    Badii, R. [Paul Scherrer Inst. (PSI), Villigen (Switzerland)

    1997-06-01

    When studying fluid dynamics, especially in a turbulent regime, it is crucial to estimate the number of active degrees of freedom or of localized structures in the system. The topological entropy quantifies the exponential growth of the number of `distinct` orbits in a dynamical system as a function of their length, in the infinite spatial resolution limit. Here, I illustrate a novel method for its evaluation, which extends beyond maps and is applicable to any system, including autonomous flows: these are characterized by lack of a definite absolute time scale for the orbit lengths. (author) 8 refs.

  12. BART: The Czech Autonomous Observatory

    Czech Academy of Sciences Publication Activity Database

    Nekola, Martin; Hudec, René; Jelínek, M.; Kubánek, P.; Štrobl, Jan; Polášek, Cyril

    2010-01-01

    Roč. 2010, Spec. Is. (2010), 103986/1-103986/5 ISSN 1687-7969. [Workshop on Robotic Autonomous Observatories. Málaga, 18.05.2009-21.05.2009] R&D Projects: GA ČR GA205/08/1207 Grant - others:ESA(XE) ESA-PECS project No. 98023; Spanish Ministry of Education and Science(ES) AP2003-1407 Institutional research plan: CEZ:AV0Z10030501 Keywords : robotic telescope * BART * gamma ray bursts Subject RIV: BN - Astronomy, Celestial Mechanics, Astrophysics http://www.hindawi.com/journals/aa/2010/103986.html

  13. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  14. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  15. Profile formation and sustainment of autonomous tokamak plasma with current hole configuration

    International Nuclear Information System (INIS)

    Hayashi, N.; Takizuka, T.; Ozeki, T.

    2005-01-01

    We have investigated the profile formation and sustainment of tokamak plasmas with the current hole (CH) configuration by using 1.5D time-dependent transport simulations. A model of the current limit inside the CH on the basis of the Axisymmetric Tri-Magnetic-Islands equilibrium is introduced into the transport simulation. We found that a transport model with the sharp reduction of anomalous transport in the reversed-shear (RS) region can reproduce the time evolution of profiles observed in JT-60U experiments. The transport becomes neoclassical-level in the RS region, which results in the formation of profiles with internal transport barrier (ITB) and CH. The CH plasma has an autonomous property because of the strong interaction between a pressure profile and a current profile through the large bootstrap current fraction. The ITB width determined by the neoclassical-level transport agrees well with that measured in JT-60U. The energy confinement inside the ITB agrees with the scaling based on the JT-60U data. The scaling means the autonomous limitation of energy confinement in the CH plasma. The plasma with the large CH is sustained with the full current drive by the bootstrap current. The plasma with the small CH and the small bootstrap current fraction shrinks due to the penetration of inductive current. This shrink is prevented and the CH size can be controlled by the appropriate external current drive (CD). The CH plasma is found to respond autonomically to the external CD. (author)

  16. Nanotechnology in the Security

    CERN Document Server

    Kruchinin, Sergei

    2015-01-01

    The topics discussed at the NATO Advanced Research Workshop "Nanotechnology in the Security Systems" included nanophysics,   nanotechnology,  nanomaterials, sensors, biosensors security systems, explosive  detection . There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nanoscience have demonstrated that fundamentally new physical phenomena  are found when systems are reduced in size with  dimensions, comparable to the fundamental microscopic  length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nanodevices. This work will be of interest to researchers working in spintronics, molecular electronics and quantum information processing.

  17. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    OpenAIRE

    V. A. Nikolayev

    2012-01-01

    Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  18. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    Directory of Open Access Journals (Sweden)

    V. A. Nikolayev

    2012-01-01

    Full Text Available Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  19. Autonomous Lawnmower using FPGA implementation.

    Science.gov (United States)

    Ahmad, Nabihah; Lokman, Nabill bin; Helmy Abd Wahab, Mohd

    2016-11-01

    Nowadays, there are various types of robot have been invented for multiple purposes. The robots have the special characteristic that surpass the human ability and could operate in extreme environment which human cannot endure. In this paper, an autonomous robot is built to imitate the characteristic of a human cutting grass. A Field Programmable Gate Array (FPGA) is used to control the movements where all data and information would be processed. Very High Speed Integrated Circuit (VHSIC) Hardware Description Language (VHDL) is used to describe the hardware using Quartus II software. This robot has the ability of avoiding obstacle using ultrasonic sensor. This robot used two DC motors for its movement. It could include moving forward, backward, and turning left and right. The movement or the path of the automatic lawn mower is based on a path planning technique. Four Global Positioning System (GPS) plot are set to create a boundary. This to ensure that the lawn mower operates within the area given by user. Every action of the lawn mower is controlled by the FPGA DE' Board Cyclone II with the help of the sensor. Furthermore, Sketch Up software was used to design the structure of the lawn mower. The autonomous lawn mower was able to operate efficiently and smoothly return to coordinated paths after passing the obstacle. It uses 25% of total pins available on the board and 31% of total Digital Signal Processing (DSP) blocks.

  20. Structured control for autonomous robots

    International Nuclear Information System (INIS)

    Simmons, R.G.

    1994-01-01

    To operate in rich, dynamic environments, autonomous robots must be able to effectively utilize and coordinate their limited physical and occupational resources. As complexity increases, it becomes necessary to impose explicit constraints on the control of planning, perception, and action to ensure that unwanted interactions between behaviors do not occur. This paper advocates developing complex robot systems by layering reactive behaviors onto deliberative components. In this structured control approach, the deliberative components handle normal situations and the reactive behaviors, which are explicitly constrained as to when and how they are activated, handle exceptional situations. The Task Control Architecture (TCA) has been developed to support this approach. TCA provides an integrated set of control constructs useful for implementing deliberative and reactive behaviors. The control constructs facilitate modular and evolutionary system development: they are used to integrate and coordinate planning, perception, and execution, and to incrementally improve the efficiency and robustness of the robot systems. To date, TCA has been used in implementing a half-dozen mobile robot systems, including an autonomous six-legged rover and indoor mobile manipulator

  1. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  2. The course of paraventricular hypothalamic efferents to autonomic structures in medulla and spinal cord

    NARCIS (Netherlands)

    Luiten, P.G.M.; Horst, G.J. ter; Karst, H.; Steffens, A.B.

    1985-01-01

    By application of the anterograde transport technique of Phaseolus vulgaris leuco-agglutinin the descending autonomic projection of the paraventricular hypothalamic nucleus was investigated. The Phaseolus lectin technique allowed the detection of the cells of origin in the paraventricular PVN, the

  3. Collective Modular Underwater Robotic System for Long-Term Autonomous Operation

    DEFF Research Database (Denmark)

    Christensen, David Johan; Andersen, Jens Christian; Blanke, Mogens

    This paper provides a brief overview of an underwater robotic system for autonomous inspection in confined offshore underwater structures. The system, which is currently in development, consist of heterogeneous modular robots able to physically dock and communicate with other robots, transport...

  4. Measurements on an autonomous wireless payload at 635 km distance using a sensitive radio telescope

    NARCIS (Netherlands)

    Bentum, Marinus Jan; Leijtens, Johan; Verhoeven, Chris; van der Marel, Hans

    2011-01-01

    The Delfi-C3 spacecraft carries the first autonomous wireless payload in space. This payload is a wireless sun sensor developed by TNO in the Netherlands. The data captured by the sensor is wirelessly transported to the central computer system inside the spacecraft. Since no additional power supply

  5. Biofuels for sustainable transportation

    Energy Technology Data Exchange (ETDEWEB)

    Neufeld, S.

    2000-05-23

    Biomass is an attractive energy source, and transportation fuels made from biomass offer a number of benefits. Developing the technology to produce and use biofuels will create transportation fuel options that can positively impact the national energy security, the economy, and the environment. Biofuels include ethanol, methanol, biodiesel, biocrude, and methane.

  6. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  7. An autonomous weeding robot for organic farming

    NARCIS (Netherlands)

    Bakker, T.; Asselt, van C.J.; Bontsema, J.; Müller, J.; Straten, van G.

    2006-01-01

    The objective of this research is the replacement of hand weeding in organic farming by a device working autonomously at ¯eld level. The autonomous weeding robot was designed using a structured design approach, giving a good overview of the total design. A vehicle was developed with a diesel engine,

  8. Autonomous Control of Space Reactor Systems

    International Nuclear Information System (INIS)

    Belle R. Upadhyaya; K. Zhao; S.R.P. Perillo; Xiaojia Xu; M.G. Na

    2007-01-01

    Autonomous and semi-autonomous control is a key element of space reactor design in order to meet the mission requirements of safety, reliability, survivability, and life expectancy. Interrestrial nuclear power plants, human operators are available to perform intelligent control functions that are necessary for both normal and abnormal operational conditions

  9. Overfeeding, autonomic regulation and metabolic consequences.

    NARCIS (Netherlands)

    Scheurink, A.J.W.; Balkan, B; Strubbe, J.H.; van Dijk, G.; Steffens, A.B

    The autonomic nervous system plays an important role in the regulation of body processes in health and disease. Overfeeding and obesity (a disproportional increase of the fat mass of the body) are often accompanied by alterations in both sympathetic and parasympathetic autonomic functions. The

  10. Technologies for highly miniaturized autonomous sensor networks

    NARCIS (Netherlands)

    Baert, K.; Gyselinckx, B.; Torfs, T.; Leonov, V.; Yazicioglu, F.; Brebels, S.; Donnay, S.; Vanfleteren, J.; Beyne, E.; Hoof, C. van

    2006-01-01

    Recent results of the autonomous sensor research program HUMAN++ will be summarized in this paper. The research program aims to achieve highly miniaturized and (nearly) autonomous sensor systems that assist our health and comfort. Although the application examples are dedicated to human

  11. Cooperative Control of Multiple Unmanned Autonomous Vehicles

    Science.gov (United States)

    2005-06-03

    I I Final Report 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Cooperative Control of Multiple Unmanned Autonomous Vehicles F49620-01-1-0337 6. AUTHOR(S... Autonomous Vehicles Final Report Kendall E. Nygard Department of Computer Science and Operations Research North Dakota State University Fargo, ND 58105-5164

  12. Autonomy Level Specification for Intelligent Autonomous Vehicles

    Science.gov (United States)

    2003-09-01

    Autonomy Level Specification for Intelligent Autonomous Vehicles : Interim Progress Report Hui-Min Huang, Elena Messina, James Albus...Level Specification for Intelligent Autonomous Vehicles : Interim Progress Report 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  13. Safe and Autonomous Drones for Urban Flight

    Science.gov (United States)

    Krishnakumar, Kalmanje

    2016-01-01

    Autonomous vehicles are no longer futuristic technology; in fact, there are already cars with self-driving features on the road. Over the next five years, the connected vehicles will disrupt the entire automotive and UAS ecosystems. The industry will undergo fundamental change as semi-autonomous driving and flying emerges, followed by an eventual shift to full autonomy.

  14. Autonomous Control of Space Reactor Systems

    Energy Technology Data Exchange (ETDEWEB)

    Belle R. Upadhyaya; K. Zhao; S.R.P. Perillo; Xiaojia Xu; M.G. Na

    2007-11-30

    Autonomous and semi-autonomous control is a key element of space reactor design in order to meet the mission requirements of safety, reliability, survivability, and life expectancy. Interrestrial nuclear power plants, human operators are avilable to perform intelligent control functions that are necessary for both normal and abnormal operational conditions.

  15. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  16. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  17. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  18. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  19. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  20. ROV90 - A prototype autonomous inspection vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Roedseth, Oe.J.; Hallset, J.O.

    1991-04-01

    Simple autonomous inspection vehicles are suitable for operations where the cost, danger to humans, or area of operation prohibits the use of conventional underwater technology. Autonomous vehicles are, however, in their infancy and few such vehicles are available. There are still some problems to be overcome before this technology becomes useful in commercial applications. We have built ROV90 to investigate these problems. It is a test bed for experimenting with the different parts of an autonomous underwater vehicle. ROV90 will be able to autonomously follow prominent features in the real world, man made or natural. Examples are pipelines or walls in tunnels. ROV90 is tethered, but we are planning to use experience and results from ROV90 to develop av ''real'' autonomous underwater vehicle (AUV) called PISCIS. 11 refs., 8 figs.

  1. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  3. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  4. Current challenges in autonomous driving

    Science.gov (United States)

    Barabás, I.; Todoruţ, A.; Cordoş, N.; Molea, A.

    2017-10-01

    Nowadays the automotive industry makes a quantum shift to a future, where the driver will have smaller and smaller role in driving his or her vehicle ending up being totally excluded. In this paper, we have investigated the different levels of driving automatization, the prospective effects of these new technologies on the environment and traffic safety, the importance of regulations and their current state, the moral aspects of introducing these technologies and the possible scenarios of deploying the autonomous vehicles. We have found that the self-driving technologies are facing many challenges: a) They must make decisions faster in very diverse conditions which can include many moral dilemmas as well; b) They have an important potential in reducing the environmental pollution by optimizing their routes, driving styles by communicating with other vehicles, infrastructures and their environment; c) There is a considerable gap between the self-drive technology level and the current regulations; fortunately, this gap shows a continuously decreasing trend; d) In case of many types of imminent accidents management there are many concerns about the ability of making the right decision. Considering that this field has an extraordinary speed of development, our study is up to date at the submission deadline. Self-driving technologies become increasingly sophisticated and technically accessible, and in some cases, they can be deployed for commercial vehicles as well. According to the current stage of research and development, it is still unclear how the self-driving technologies will be able to handle extreme and unexpected events including their moral aspects. Since most of the traffic accidents are caused by human error or omission, it is expected that the emergence of the autonomous technologies will reduce these accidents in their number and gravity, but the very few currently available test results have not been able to scientifically underpin this issue yet. The

  5. Transport Statistics - Transport - UNECE

    Science.gov (United States)

    Sustainable Energy Statistics Trade Transport Themes UNECE and the SDGs Climate Change Gender Ideas 4 Change UNECE Weekly Videos UNECE Transport Areas of Work Transport Statistics Transport Transport Statistics About us Terms of Reference Meetings and Events Meetings Working Party on Transport Statistics (WP.6

  6. Autonomic Function in Neurodegenerative Diseases

    DEFF Research Database (Denmark)

    Sørensen, Gertrud Laura; Jennum, Poul Jørgen

    2013-01-01

    areas, which is consistent with the Braak hypothesis. In the narcolepsy patients, it was shown that a reduced HRR to arousals was primarily predicted by hypocretin deficiency in both rapid-eye-movement (REM) and non-REM sleep, independent of cataplexy and other factors. The results confirm...... that hypocretin deficiency affects the autonomic nervous system of patients with narcolepsy and that the hypocretin system is important for proper heart rate modulation at rest.Furthermore, it was shown that hypocretin deficiency and cataplexy are associated with signs of destabilized sleep-wake and REM sleep...... control, indicating that the disorder may serve as a human model for the sleep-wake and REM sleep flip-flop switches. The increased frequency of transitions may cause increased sympathetic activity during sleep and thereby increased heart rate, or the increased heart rate could be caused by decreased...

  7. Autonomous navigation system and method

    Science.gov (United States)

    Bruemmer, David J [Idaho Falls, ID; Few, Douglas A [Idaho Falls, ID

    2009-09-08

    A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.

  8. Design of Autonomous Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Tadahiro Hyakudome

    2011-03-01

    Full Text Available There are concerns about the impact that global warming will have on our environment, and which will inevitably result in expanding deserts and rising water levels. While a lot of underwater vehicles are utilized, AUVs (Autonomous Underwater Vehicle were considered and chosen, as the most suitable tool for conduction survey concerning these global environmental problems. AUVs can comprehensive survey because the vehicle does not have to be connected to the support vessel by tether cable. When such underwater vehicles are made, it is necessary to consider about the following things. 1 Seawater and Water Pressure Environment, 2 Sink, 3 There are no Gas or Battery Charge Stations, 4 Global Positioning System cannot use, 5 Radio waves cannot use. In the paper, outline of above and how deal about it are explained.

  9. Wireless autonomous device data transmission

    Science.gov (United States)

    Sammel, Jr., David W. (Inventor); Cain, James T. (Inventor); Mickle, Marlin H. (Inventor); Mi, Minhong (Inventor)

    2013-01-01

    A method of communicating information from a wireless autonomous device (WAD) to a base station. The WAD has a data element having a predetermined profile having a total number of sequenced possible data element combinations. The method includes receiving at the WAD an RF profile transmitted by the base station that includes a triggering portion having a number of pulses, wherein the number is at least equal to the total number of possible data element combinations. The method further includes keeping a count of received pulses and wirelessly transmitting a piece of data, preferably one bit, to the base station when the count reaches a value equal to the stored data element's particular number in the sequence. Finally, the method includes receiving the piece of data at the base station and using the receipt thereof to determine which of the possible data element combinations the stored data element is.

  10. Autonomous Infrastructure for Observatory Operations

    Science.gov (United States)

    Seaman, R.

    This is an era of rapid change from ancient human-mediated modes of astronomical practice to a vision of ever larger time domain surveys, ever bigger "big data", to increasing numbers of robotic telescopes and astronomical automation on every mountaintop. Over the past decades, facets of a new autonomous astronomical toolkit have been prototyped and deployed in support of numerous space missions. Remote and queue observing modes have gained significant market share on the ground. Archives and data-mining are becoming ubiquitous; astroinformatic techniques and virtual observatory standards and protocols are areas of active development. Astronomers and engineers, planetary and solar scientists, and researchers from communities as diverse as particle physics and exobiology are collaborating on a vast range of "multi-messenger" science. What then is missing?

  11. Digital autonomous terminal access communications

    Science.gov (United States)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  12. Full autonomous microline trace robot

    Science.gov (United States)

    Yi, Deer; Lu, Si; Yan, Yingbai; Jin, Guofan

    2000-10-01

    Optoelectric inspection may find applications in robotic system. In micro robotic system, smaller optoelectric inspection system is preferred. However, as miniaturizing the size of the robot, the number of the optoelectric detector becomes lack. And lack of the information makes the micro robot difficult to acquire its status. In our lab, a micro line trace robot has been designed, which autonomous acts based on its optoelectric detection. It has been programmed to follow a black line printed on the white colored ground. Besides the optoelectric inspection, logical algorithm in the microprocessor is also important. In this paper, we propose a simply logical algorithm to realize robot's intelligence. The robot's intelligence is based on a AT89C2051 microcontroller which controls its movement. The technical details of the micro robot are as follow: dimension: 30mm*25mm*35*mm; velocity: 60mm/s.

  13. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  14. Phase I Flow and Transport Model Document for Corrective Action Unit 97: Yucca Flat/Climax Mine, Nevada National Security Site, Nye County, Nevada, Revision 1 with ROTCs 1 and 2

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Robert

    2013-09-01

    The Underground Test Area (UGTA) Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, in the northeast part of the Nevada National Security Site (NNSS) requires environmental corrective action activities to assess contamination resulting from underground nuclear testing. These activities are necessary to comply with the UGTA corrective action strategy (referred to as the UGTA strategy). The corrective action investigation phase of the UGTA strategy requires the development of groundwater flow and contaminant transport models whose purpose is to identify the lateral and vertical extent of contaminant migration over the next 1,000 years. In particular, the goal is to calculate the contaminant boundary, which is defined as a probabilistic model-forecast perimeter and a lower hydrostratigraphic unit (HSU) boundary that delineate the possible extent of radionuclide-contaminated groundwater from underground nuclear testing. Because of structural uncertainty in the contaminant boundary, a range of potential contaminant boundaries was forecast, resulting in an ensemble of contaminant boundaries. The contaminant boundary extent is determined by the volume of groundwater that has at least a 5 percent chance of exceeding the radiological standards of the Safe Drinking Water Act (SDWA) (CFR, 2012).

  15. Radioactive material air transportation

    International Nuclear Information System (INIS)

    Pader y Terry, Claudio Cosme

    2002-01-01

    As function of the high aggregated value, safety regulations and the useful life time, the air transportation has been used more regularly because is fast, reliable, and by giving great security to the cargo. Based on the International Atomic Energy Agency (IAEA), the IATA (International Air Transportation Association) has reproduced in his dangerous goods manual (Dangerous Goods Regulations - DGR IATA), the regulation for the radioactive material air transportation. Those documents support this presentation

  16. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. Cloud Incubator Car: A Reliable Platform for Autonomous Driving

    Directory of Open Access Journals (Sweden)

    Raúl Borraz

    2018-02-01

    Full Text Available It appears clear that the future of road transport is going through enormous changes (intelligent transport systems, the main one being the Intelligent Vehicle (IV. Automated driving requires a huge research effort in multiple technological areas: sensing, control, and driving algorithms. We present a comprehensible and reliable platform for autonomous driving technology development as well as for testing purposes, developed in the Intelligent Vehicles Lab at the Technical University of Cartagena. We propose an open and modular architecture capable of easily integrating a wide variety of sensors and actuators which can be used for testing algorithms and control strategies. As a proof of concept, this paper presents a reliable and complete navigation application for a commercial vehicle (Renault Twizy. It comprises a complete perception system (2D LIDAR, 3D HD LIDAR, ToF cameras, Real-Time Kinematic (RTK unit, Inertial Measurement Unit (IMU, an automation of the driving elements of the vehicle (throttle, steering, brakes, and gearbox, a control system, and a decision-making system. Furthermore, two flexible and reliable algorithms are presented for carrying out global and local route planning on board autonomous vehicles.

  20. Current challenges in autonomous vehicle development

    Science.gov (United States)

    Connelly, J.; Hong, W. S.; Mahoney, R. B., Jr.; Sparrow, D. A.

    2006-05-01

    The field of autonomous vehicles is a rapidly growing one, with significant interest from both government and industry sectors. Autonomous vehicles represent the intersection of artificial intelligence (AI) and robotics, combining decision-making with real-time control. Autonomous vehicles are desired for use in search and rescue, urban reconnaissance, mine detonation, supply convoys, and more. The general adage is to use robots for anything dull, dirty, dangerous or dumb. While a great deal of research has been done on autonomous systems, there are only a handful of fielded examples incorporating machine autonomy beyond the level of teleoperation, especially in outdoor/complex environments. In an attempt to assess and understand the current state of the art in autonomous vehicle development, a few areas where unsolved problems remain became clear. This paper outlines those areas and provides suggestions for the focus of science and technology research. The first step in evaluating the current state of autonomous vehicle development was to develop a definition of autonomy. A number of autonomy level classification systems were reviewed. The resulting working definitions and classification schemes used by the authors are summarized in the opening sections of the paper. The remainder of the report discusses current approaches and challenges in decision-making and real-time control for autonomous vehicles. Suggested research focus areas for near-, mid-, and long-term development are also presented.

  1. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  2. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  3. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  4. PHM Enabled Autonomous Propellant Loading Operations

    Science.gov (United States)

    Walker, Mark; Figueroa, Fernando

    2017-01-01

    The utility of Prognostics and Health Management (PHM) software capability applied to Autonomous Operations (AO) remains an active research area within aerospace applications. The ability to gain insight into which assets and subsystems are functioning properly, along with the derivation of confident predictions concerning future ability, reliability, and availability, are important enablers for making sound mission planning decisions. When coupled with software that fully supports mission planning and execution, an integrated solution can be developed that leverages state assessment and estimation for the purposes of delivering autonomous operations. The authors have been applying this integrated, model-based approach to the autonomous loading of cryogenic spacecraft propellants at Kennedy Space Center.

  5. Autonomic symptoms in idiopathic REM behavior disorder

    DEFF Research Database (Denmark)

    Ferini-Strambi, Luigi; Oertel, Wolfgang; Dauvilliers, Yves

    2014-01-01

    Patients with idiopathic REM sleep behavior disorder (iRBD) are at very high risk of developing neurodegenerative synucleinopathies, which are disorders with prominent autonomic dysfunction. Several studies have documented autonomic dysfunction in iRBD, but large-scale assessment of autonomic...... symptoms has never been systematically performed. Patients with polysomnography-confirmed iRBD (318 cases) and controls (137 healthy volunteers and 181 sleep center controls with sleep diagnoses other than RBD) were recruited from 13 neurological centers in 10 countries from 2008 to 2011. A validated scale...

  6. TOWARDS A NEW ARCHITECTURE FOR AUTONOMOUS DATA COLLECTION

    Directory of Open Access Journals (Sweden)

    T. J. Tanzi

    2015-08-01

    Full Text Available A new generation of UAVs is coming that will help improve the situational awareness and assessment necessary to ensure quality data collection, especially in difficult conditions like natural disasters. Operators should be relieved from time-consuming data collection tasks as much as possible and at the same time, UAVs should assist data collection operations through a more insightful and automated guidance thanks to advanced sensing capabilities. In order to achieve this vision, two challenges must be addressed though. The first one is to achieve a sufficient autonomy, both in terms of navigation and of interpretation of the data sensed. The second one relates to the reliability of the UAV with respect to accidental (safety or even malicious (security risks. This however requires the design and development of new embedded architectures for drones to be more autonomous, while mitigating the harm they may potentially cause. We claim that the increased complexity and flexibility of such platforms requires resorting to modelling, simulation, or formal verification techniques in order to validate such critical aspects of the platform. This paper first discusses the potential and challenges faced by autonomous UAVs for data acquisition. The design of a flexible and adaptable embedded UAV architecture is then addressed. Finally, the need for validating the properties of the platform is discussed. Our approach is sketched and illustrated with the example of a lightweight drone performing 3D reconstructions out of the combination of 2D image acquisition and a specific motion control.

  7. Enabling autonomous control for space reactor power systems

    International Nuclear Information System (INIS)

    Wood, R. T.

    2006-01-01

    The application of nuclear reactors for space power and/or propulsion presents some unique challenges regarding the operations and control of the power system. Terrestrial nuclear reactors employ varying degrees of human control and decision-making for operations and benefit from periodic human interaction for maintenance. In contrast, the control system of a space reactor power system (SRPS) employed for deep space missions must be able to accommodate unattended operations due to communications delays and periods of planetary occlusion while adapting to evolving or degraded conditions with no opportunity for repair or refurbishment. Thus, a SRPS control system must provide for operational autonomy. Oak Ridge National Laboratory (ORNL) has conducted an investigation of the state of the technology for autonomous control to determine the experience base in the nuclear power application domain, both for space and terrestrial use. It was found that control systems with varying levels of autonomy have been employed in robotic, transportation, spacecraft, and manufacturing applications. However, autonomous control has not been implemented for an operating terrestrial nuclear power plant nor has there been any experience beyond automating simple control loops for space reactors. Current automated control technologies for nuclear power plants are reasonably mature, and basic control for a SRPS is clearly feasible under optimum circumstances. However, autonomous control is primarily intended to account for the non optimum circumstances when degradation, failure, and other off-normal events challenge the performance of the reactor and near-term human intervention is not possible. Thus, the development and demonstration of autonomous control capabilities for the specific domain of space nuclear power operations is needed. This paper will discuss the findings of the ORNL study and provide a description of the concept of autonomy, its key characteristics, and a prospective

  8. An Artificial Neural Network Controller for Intelligent Transportation Systems Applications

    Science.gov (United States)

    1996-01-01

    An Autonomous Intelligent Cruise Control (AICC) has been designed using a feedforward artificial neural network, as an example for utilizing artificial neural networks for nonlinear control problems arising in intelligent transportation systems appli...

  9. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  10. 49 CFR 10.29 - Social Security numbers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Social Security numbers. 10.29 Section 10.29... INDIVIDUALS Maintenance of Records § 10.29 Social Security numbers. (a) No individual is denied any right... which is required by Federal statute; or (2) The disclosure of a Social Security number when such...

  11. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  12. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  13. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... 49 Transportation 4 2010-10-01 2010-10-01 false Communications and security requirements. 236.1033... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  14. Engineering Autonomous Chemomechanical Nanomachines Using Brownian Ratchets

    Science.gov (United States)

    Lavella, Gabriel

    Nanoscale machines which directly convert chemical energy into mechanical work are ubiquitous in nature and are employed to perform a diverse set of tasks such as transporting molecules, maintaining molecular gradients, and providing motion to organisms. Their widespread use in nature suggests that large technological rewards can be obtained by designing synthetic machines that use similar mechanisms. This thesis addresses the technological adaptation of a specific mechanism known as the Brownian ratchet for the design of synthetic autonomous nanomachines. My efforts were focused more specifically on synthetic chemomechanical ratchets which I deem will be broadly applicable in the life sciences. In my work I have theoretically explored the biophysical mechanisms and energy landscapes that give rise to the ratcheting phenomena and devised devices that operate off these principles. I demonstrate two generations of devices that produce mechanical force/deformation in response to a user specified ligand. The first generation devices, fabricatied using a combination nanoscale lithographic processes and bioconjugation techniques, were used to provide evidence that the proposed ratcheting phenomena can be exploited in synthetic architectures. Second generation devices fabricated using self-assembled DNA/hapten motifs were constructed to gain a precise understanding of ratcheting dynamics and design constraints. In addition, the self-assembled devices enabled fabrication en masse, which I feel will alleviate future experimental hurdles in analysis and facilitate its adaptation to technologies. The product of these efforts is an architecture that has the potential to enable numerous technologies in biosensing and drug delivery. For example, the coupling of molecule-specific actuation to the release of drugs or signaling molecules from nanocapsules or porous materials could be transformative. Such architectures could provide possible avenues to pressing issues in biology and

  15. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-07-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  16. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    Mc Govern, D.E.

    1987-01-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  17. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-06-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided. 4 refs., 1 fig., 1 tab

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  20. 49 CFR 234.211 - Security of warning system apparatus.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GRADE CROSSING SIGNAL SYSTEM SAFETY AND STATE ACTION PLANS Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus...