WorldWideScience

Sample records for secure transportable autonomous

  1. Autonomic computing meets SCADA security

    OpenAIRE

    Nazir, S; Patel, S; Patel, D

    2017-01-01

    © 2017 IEEE. National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the auton...

  2. Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles

    Science.gov (United States)

    2016-04-01

    Update Will Enable Autonomous Driving. Retrieved August 6, 2015, from http://spectrum.ieee.org/: http://spectrum.ieee.org/ cars -that-think...Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles 1 UNCLASSIFIED Cyber Security Considerations for... Autonomous Tactical Wheeled Vehicles Sebastian C Iovannitti 4/1/2016 Submitted to Lawrence Technological University College of Management in

  3. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  4. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  5. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. Design of an Autonomous Transport System for Coastal Areas

    Directory of Open Access Journals (Sweden)

    Andrzej Lebkowski

    2018-03-01

    Full Text Available The article presents a project of an autonomous transport system that can be deployed in coastal waters, bays or between islands. Presented solutions and development trends in the transport of autonomous and unmanned units (ghost ships are presented. The structure of the control system of autonomous units is discussed together with the presentation of applied solutions in the field of artificial intelligence. The paper presents the concept of a transport system consisting of autonomous electric powered vessels designed to carry passengers, bikes, mopeds, motorcycles or passenger cars. The transport task is to be implemented in an optimal way, that is, most economically and at the same time as safe as possible. For this reason, the structure of the electric propulsion system that can be found on such units is shown. The results of simulation studies of autonomous system operation using simulator of marine navigational environment are presented.

  7. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  8. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  9. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  10. An autonomic security monitor for distributed operating systems

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Maj, S.; Matthews, B.

    2011-01-01

    This paper presents an autonomic system for the monitoring of security-relevant information in a Grid-based operating system. The system implements rule-based policies using Java Drools. Policies are capable of controlling the system environment based on changes in levels of CPU/memory usage, accesses to system resources, detection of abnormal behaviour such as DDos attacks.

  11. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  12. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  13. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  14. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  15. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  16. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  17. IT-security challenges in IoT environments and autonomous systems

    Science.gov (United States)

    Heun, Ulrich

    2017-05-01

    Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.

  18. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  19. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport

  20. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  1. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  2. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.

    2013-01-01

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.

  3. 12th International Conference on Intelligent Autonomous Systems

    CERN Document Server

    Cho, Hyungsuck; Yoon, Kwang-Joon; Lee, Jangmyung

    2013-01-01

    Intelligent autonomous systems are emerged as a key enabler for the creation of a new paradigm of services to humankind, as seen by the recent advancement of autonomous cars licensed for driving in our streets, of unmanned aerial and underwater vehicles carrying out hazardous tasks on-site, and of space robots engaged in scientific as well as operational missions, to list only a few. This book aims at serving the researchers and practitioners in related fields with a timely dissemination of the recent progress on intelligent autonomous systems, based on a collection of papers presented at the 12th International Conference on Intelligent Autonomous Systems, held in Jeju, Korea, June 26-29, 2012. With the theme of “Intelligence and Autonomy for the Service to Humankind, the conference has covered such diverse areas as autonomous ground, aerial, and underwater vehicles, intelligent transportation systems, personal/domestic service robots, professional service robots for surgery/rehabilitation, rescue/security ...

  4. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  5. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  6. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  7. Intelligent autonomous systems 12. Vol. 2. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sukhan [Sungkyunkwan Univ., Gyeonggi-Do (Korea, Republic of). College of Information and Communication Engineering; Yoon, Kwang-Joon [Konkuk Univ., Seoul (Korea, Republic of); Cho, Hyungsuck [Daegu Gyeongbuk Institute of Science and Technology, Daegu (Korea, Republic of); Lee, Jangmyung (eds.) [Pusan National Univ. (Korea, Republic of). Dept. of Electronics Engineering

    2013-02-01

    Recent research in Intelligent and Autonomous Systems. Volume 2 of the proceedings of the 12th International Conference IAS-12, held June 26-29, 2012, jeju Island, Korea. Written by leading experts in the field. Intelligent autonomous systems are emerged as a key enabler for the creation of a new paradigm of services to humankind, as seen by the recent advancement of autonomous cars licensed for driving in our streets, of unmanned aerial and underwater vehicles carrying out hazardous tasks on-site, and of space robots engaged in scientific as well as operational missions, to list only a few. This book aims at serving the researchers and practitioners in related fields with a timely dissemination of the recent progress on intelligent autonomous systems, based on a collection of papers presented at the 12th International Conference on Intelligent Autonomous Systems, held in Jeju, Korea, June 26-29, 2012. With the theme of ''Intelligence and Autonomy for the Service to Humankind, the conference has covered such diverse areas as autonomous ground, aerial, and underwater vehicles, intelligent transportation systems, personal/domestic service robots, professional service robots for surgery/rehabilitation, rescue/security and space applications, and intelligent autonomous systems for manufacturing and healthcare. This volume 2 includes contributions devoted to Service Robotics and Human-Robot Interaction and Autonomous Multi-Agent Systems and Life Engineering.

  8. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  9. RF energy harvesting and transport for wireless autonomous sensor network applications

    NARCIS (Netherlands)

    Keyrouz, S.; Visser, H.J.

    2013-01-01

    "RF Energy Harvesting and Transport for Wireless Autonomous Sensor Network Applications: Principles and Requirements" - For wireless energy transfer over longer distances, the far-field transfer of RF energy may be used. We make a distinction between harvesting RF energy from signals present in the

  10. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  11. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  12. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  13. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  14. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  15. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  16. A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform

    Directory of Open Access Journals (Sweden)

    Jingjie Zhang

    2018-01-01

    Full Text Available With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. For example, data stored in the cloud platform may be attacked, and its security is difficult to be guaranteed. Therefore, we must attach weight to the issue of how to protect the data stored in the cloud. To protect data, data monitoring is a necessary process. Based on autonomic computing, we develop a cloud data monitoring system on the cloud platform, monitoring whether the data is abnormal in the cycle and analyzing the security of the data according to the monitored results. In this paper, the feasibility of the scheme can be verified through simulation. The results show that the proposed method can adapt to the dynamic change of cloud platform load, and it can also accurately evaluate the degree of abnormal data. Meanwhile, by adjusting monitoring frequency automatically, it improves the accuracy and timeliness of monitoring. Furthermore, it can reduce the monitoring cost of the system in normal operation process.

  17. Transportation Security Institute: recruiting next generation professionals.

    Science.gov (United States)

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  18. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  19. Security in the transport of radioactive material - interim guidance for comment

    International Nuclear Information System (INIS)

    Legoux, P.; Wangler, M.

    2004-01-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal authorities

  20. Security in the transport of radioactive material - interim guidance for comment

    Energy Technology Data Exchange (ETDEWEB)

    Legoux, P.; Wangler, M. [International Atomic Energy Agency, Vienna (Austria)

    2004-07-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal

  1. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  2. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  3. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  4. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  5. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  6. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  8. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  9. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  10. Analysis and comparison of transportation security systems

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1976-05-01

    The role of modeling in the analysis of transportation security systems is described. Various modeling approaches are outlined. The conflict model developed in Sandia Laboratories' Transportation Mode Analysis for the NRC Special Safeguards Study is used to demonstrate the capability of models to determine system sensitivities and compare alternatives

  11. New Concepts and Perspectives on Micro-Rotorcraft and Small Autonomous Rotary-Wing Vehicles

    Science.gov (United States)

    Young, Larry A.; Aiken, E. W.; Johnson, J. L.; Demblewski, R.; Andrews, J.; Aiken, Irwin W. (Technical Monitor)

    2001-01-01

    A key part of the strategic vision for rotorcraft research as identified by senior technologists within the Army/NASA Rotorcraft Division at NASA Ames Research Center is the development and use of small autonomous rotorcraft. Small autonomous rotorcraft are defined for the purposes of this paper to be a class of vehicles that range in size from rotary-wing micro air vehicles (MAVs) to larger, more conventionally sized, rotorcraft uninhabited aerial vehicles (UAVs) - i.e. vehicle gross weights ranging from hundreds of grams to thousands of kilograms. The development of small autonomous rotorcraft represents both a technology challenge and a potential new vehicle class that will have substantial societal impact for: national security, personal transport, planetary science, and public service.

  12. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  13. 49 CFR 209.501 - Review of rail transportation safety and security route analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Review of rail transportation safety and security....820 § 209.501 Review of rail transportation safety and security route analysis. (a) Review of route... establish that the route chosen by the carrier poses the least overall safety and security risk, the...

  14. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  15. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  16. THE PROBLEM OF PROPER CARGO SECURING IN ROAD TRANSPORT – CASE STUDY

    Directory of Open Access Journals (Sweden)

    Maria CIEŚLA

    2013-12-01

    Full Text Available This paper presents the problem of improper security of cargo in trucks as the cause of about 25% of the accidents that takes place in road transport. Attention was drawn to aspects of legal liability for errors resulting from incorrect load securing according to polish law. Article was enriched with practical examples illustrating the effects of improper cargo securing on transport unit and shows how it had to be prepared properly. When planning the proper transport protection of metal sheets rolled both calculation methods and computer applications were used.

  17. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  18. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  19. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  20. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  1. Application of the API/NPRA SVA methodology to transportation security issues.

    Science.gov (United States)

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  2. Goal system for comparative assessments of nuclear fuel transport under security aspects

    International Nuclear Information System (INIS)

    Behrendt, V.; Schwieren, G.

    1983-01-01

    Due to the great hazard potential of nuclear fuel transports the possibility always exists during transportation that either a single perpetrator or a group of perpetrators will try to get possession of the nuclear fuel. One can assume that at the end of such illegal actions there will be a politically (or otherwise) motivated extortion. Thinking about security one has to face things like sabotage, attacks from inside or outside the system, robbery and/or dispersion of the transported goods. In respect to the security of nuclear transports we carried out an investigation for the German Ministry of the Interior in order to review the different levels of security of different transport systems. This paper deals with the methodological approach, especially with the goal system and the way we executed the investigation

  3. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  4. Action at sea: Transport security exercise conducted off the coast of Sweden

    International Nuclear Information System (INIS)

    Isaksson, Stig; Jawerth, Nicole

    2015-01-01

    As in an action movie, ships, helicopters and uniformed people set the scene off the coast of Sweden on 6 May 2015 when national authorities conducted an exercise on security while transporting spent nuclear fuel. The exercise was part of a joint project with the IAEA to test and evaluate a new IAEA guide on planning, conducting and evaluating transport security exercises. The test subject and model was the security framework of Sweden’s national nuclear transport system, which regularly ships used fuel from power plants along the coast to the country’s interim storage facility for spent nuclear fuel.

  5. Biologically-Inspired Concepts for Autonomic Self-Protection in Multiagent Systems

    Science.gov (United States)

    Sterritt, Roy; Hinchey, Mike

    2006-01-01

    Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors &om nature and the human body, such as the autonomic nervous system. Agent technologies have been identified as a key enabler for engineering autonomy and autonomicity in systems, both in terms of retrofitting into legacy systems and in designing new systems. Handing over responsibility to systems themselves raises concerns for humans with regard to safety and security. This paper reports on the continued investigation into a strand of research on how to engineer self-protection mechanisms into systems to assist in encouraging confidence regarding security when utilizing autonomy and autonomicity. This includes utilizing the apoptosis and quiescence metaphors to potentially provide a self-destruct or self-sleep signal between autonomic agents when needed, and an ALice signal to facilitate self-identification and self-certification between anonymous autonomous agents and systems.

  6. Autonomous execution of the Precision Immobilization Technique

    Science.gov (United States)

    Mascareñas, David D. L.; Stull, Christopher J.; Farrar, Charles R.

    2017-03-01

    Over the course of the last decade great advances have been made in autonomously driving cars. The technology has advanced to the point that driverless car technology is currently being tested on publicly accessed roadways. The introduction of these technologies onto publicly accessed roadways not only raises questions of safety, but also security. Autonomously driving cars are inherently cyber-physical systems and as such will have novel security vulnerabilities that couple both the cyber aspects of the vehicle including the on-board computing and any network data it makes use of, with the physical nature of the vehicle including its sensors, actuators, and the vehicle chassis. Widespread implementation of driverless car technology will require that both the cyber, as well as physical security concerns surrounding these vehicles are addressed. In this work, we specifically developed a control policy to autonomously execute the Precision Immobilization Technique, a.k.a. the PIT maneuver. The PIT maneuver was originally developed by law enforcement to end high-speed vehicular pursuits in a quasi-safe manner. However, there is still a risk of damage/roll-over to both the vehicle executing the PIT maneuver as well as to the vehicle subject to the PIT maneuver. In law enforcement applications, it would be preferable to execute the PIT maneuver using an autonomous vehicle, thus removing the danger to law-enforcement officers. Furthermore, it is entirely possible that unscrupulous individuals could inject code into an autonomously-driving car to use the PIT maneuver to immobilize other vehicles while maintaining anonymity. For these reasons it is useful to know how the PIT maneuver can be implemented on an autonomous car. In this work a simple control policy based on velocity pursuit was developed to autonomously execute the PIT maneuver using only a vision and range measurements that are both commonly collected by contemporary driverless cars. The ability of this

  7. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  8. Security and health protection during the transport of hazardous substances

    International Nuclear Information System (INIS)

    Benkovic, Z.; Bobic, V.

    2009-01-01

    The introduction of this work describes the legal regulations which regulate the conditions and method of the transport of hazardous substances, necessary documentation for storage, forwarding and transport. Hazardous substances are defined and classified according to the ADR. The necessary security measures which are taken for the transport of particular types of hazardous substances are mentioned. Marking and labeling of vehicles for the transport of hazardous substances (plates and lists of hazards), packing and marking of packaging is important. The safety measures which are taken at the filling stations of combustible liquids as well as places specially organized for filling, prohibitions and limitations and necessary transport documentation are mentioned. It is visible from the above mentioned that the activity of the whole security chain is necessary and depends on the good knowledge of basic characteristics and features of substances. All the participants in the security chain have to be familiar with and consistently obey the legal regulations. The manufacturer must know the features of the hazardous substance, supervisory services must be acquainted with the threat and potential danger. The hauler and intervention forces must, in case of accidents and damage, be familiar with the emergency procedures in case of accidents and act properly regarding the threatening dangerous substance.(author)

  9. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  10. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  11. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  12. 3-D Vision Techniques for Autonomous Vehicles

    Science.gov (United States)

    1988-08-01

    TITLE (Include Security Classification) W 3-D Vision Techniques for Autonomous Vehicles 12 PERSONAL AUTHOR(S) Martial Hebert, Takeo Kanade, inso Kweoni... Autonomous Vehicles Martial Hebert, Takeo Kanade, Inso Kweon CMU-RI-TR-88-12 The Robotics Institute Carnegie Mellon University Acession For Pittsburgh

  13. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  14. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  15. Sustainability of Self-Driving Mobility: An Analysis of Carbon Emissions Between Autonomous Vehicles and Conventional Modes of Transportation

    OpenAIRE

    Mccarthy, John Francis

    2017-01-01

    The primary contribution of this paper is to identify the potential variables through which vehicle automation may affect carbon emissions in the transportation sector, and compare modal shifts between conventional vehicles, public transportation, and pilot autonomous vehicles (AVs). AV programs that are rapidly emerging in cities, states, and nations across the globe mark the early stages of the next transportation revolution akin to the steam engine and assembly line. By safely allowing hum...

  16. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  17. A review of tsp as one of the transportation security aspects of nuclear materials

    International Nuclear Information System (INIS)

    Wiryono

    2013-01-01

    A review has done for the Transportation Safety Plan (TSP) as one of the aspects of safety in the transport of nuclear materials. The review is necessary to harmonize national regulations with international practice. International practice of using TSP as one of the security requirements in addition to the Radiation Protection Program as a requirement of safety in the transport of nuclear materials. TSP is intended to ensure sound implementation of the transport of nuclear materials. TSP evaluation process can be done with a prescriptive approach, performance, and combinations. TSP contains information about administrative requirements, delivery security and response planning. TSP can be used to ensure the security of the implementation of the transport of nuclear materials effectively and efficiently. BAPETEN should require the applicant to submit the TSP as one document security requirements prior approval transporting nuclear materials. BAPETEN need to define the approach to the formulation and evaluation of TSP. BAPETEN need to set up an evaluation and inspection procedures for the implementation of TSP. (author)

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  19. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  20. Security Measures and some Specific Features of the Transport Police Functioning in Russia and Abroad

    Directory of Open Access Journals (Sweden)

    Petr P. Ignatushenko

    2017-03-01

    Full Text Available In the present article specifics of the transport police work in the Russian Federation are discussed, as well as in other countries of the world (USA, Germany, Israel, etc.. Attention is drawn to the need of the role and significance of the Russian police review in the matters of railway and aviation security, as well as safety on river and sea transport. The term “transport security” is a state of security of transport and transport infrastructure, consumers of transport services (passengers from various types of threats (natural and man-made, as well as acts of unlawful interference in the activities of various modes of transport – points put the author. Transport security issues are important for the creation of the transport police system in the Russian Federation, taking into account experience of foreign countries.

  1. Connected and autonomous vehicles 2040 vision.

    Science.gov (United States)

    2014-07-01

    The Pennsylvania Department of Transportation (PennDOT) commissioned a one-year project, Connected and Autonomous : Vehicles 2040 Vision, with researchers at Carnegie Mellon University (CMU) to assess the implications of connected and : autonomous ve...

  2. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  3. STAR: The Secure Transportable Autonomous Reactor System - Encapsulated Fission Heat Source

    International Nuclear Information System (INIS)

    Ehud Greenspan

    2003-01-01

    OAK-B135 The Encapsulated Nuclear Heat Source (ENHS) is a novel 125 MWth fast spectrum reactor concept that was selected by the 1999 DOE NERI program as a candidate ''Generation-IV'' reactor. It uses Pb-Bi or other liquid-metal coolant and is intended to be factory manufactured in large numbers to be economically competitive. It is anticipated to be most useful to developing countries. The US team studying the feasibility of the ENHS reactor concept consisted of the University of California, Berkeley, Argonne National Laboratory (ANL), Lawrence Livermore National Laboratory (LLNL) and Westinghouse. Collaborating with the US team were three Korean organizations: Korean Atomic Energy Research Institute (KAERI), Korean Advanced Institute for Science and Technology (KAIST) and the University of Seoul, as well as the Central Research Institute of the Electrical Power Industry (CRIEPI) of Japan. Unique features of the ENHS include at least 20 years of operation without refueling; no fuel handling in the host country; no pumps and valves; excess reactivity does not exceed 1$; fully passive removal of the decay heat; very small probability of core damaging accidents; autonomous operation and capability of load-following over a wide range; very long plant life. In addition it offers a close match between demand and supply, large tolerance to human errors, is likely to get public acceptance via demonstration of superb safety, lack of need for offsite response, and very good proliferation resistance. The ENHS reactor is designed to meet the requirements of Generation IV reactors including sustainable energy supply, low waste, high level of proliferation resistance, high level of safety and reliability, acceptable risk to capital and, hopefully, also competitive busbar cost of electricity

  4. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  5. Development and Testing of Intelligent Alcohol Transportation Security System

    Directory of Open Access Journals (Sweden)

    Velaphi Msomi

    2018-01-01

    Full Text Available The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. The system was developed such that only the radar level sensor (VEGAPULS 62 might be in contact with the fluid and the rest of the system remained outside the liquid carrying container to be secured. The system was developed such that it reports any abnormal liquid level drop through short message service (SMS. The functioning of the developed system was tested through the use of 1040 L Intermediate Bulk Container (IBC filled with water which was hauled for about 1.5 km. The liquid theft was simulated and the system sent two SMS. The first SMS reported the beginning of water level drop and the second one reported the ending of water level drop. The second SMS reported the amount of liquid that was taken out of the container.

  6. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  7. Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Editor)

    2004-01-01

    The existing U.S. hub-and-spoke air transportation system is reaching saturation. Major aspects of the current system, such as capacity, safety, mobility, customer satisfaction, security, communications, and ecological effects, require improvements. The changing dynamics - increased presence of general aviation, unmanned autonomous vehicles, military aircraft in civil airspace as part of homeland defense - contributes to growing complexity of airspace. The system has proven remarkably resistant to change. NASA Langley Research Center and the National Institute of Aerospace conducted a workshop on Transportation Network Topologies on 9-10 December 2003 in Williamsburg, Virginia. The workshop aimed to examine the feasibility of traditional methods for complex system analysis and design as well as potential novel alternatives in application to transportation systems, identify state-of-the-art models and methods, conduct gap analysis, and thus to lay a foundation for establishing a focused research program in complex systems applied to air transportation.

  8. Safety and security in transportation of radioactive material- the perception of risk

    Energy Technology Data Exchange (ETDEWEB)

    Ericsson, A.M.; Jaernry, C. [AMC Konsult AB, Bromma (Sweden)

    2004-07-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations.

  9. Safety and security in transportation of radioactive material- the perception of risk

    International Nuclear Information System (INIS)

    Ericsson, A.M.; Jaernry, C.

    2004-01-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations

  10. Autonomous vehicles:challenges, opportunities, and future implications for transportation policies

    Institute of Scientific and Technical Information of China (English)

    Saeed Asadi Bagloee; Madjid Tavana; Mohsen Asadi; Tracey Oliver

    2016-01-01

    This study investigates the challenges and opportunities pertaining to transportation policies that may arise as a result of emerging autonomous vehicle (AV) technologies. AV technologies can decrease the trans-portation cost and increase accessibility to low-income households and persons with mobility issues. This emerg-ing technology also has far-reaching applications and implications beyond all current expectations. This paper provides a comprehensive review of the relevant literature and explores a broad spectrum of issues from safety to machine ethics. An indispensable part of a prospective AV development is communication over cars and infrastructure (connected vehicles). A major knowledge gap exists in AV technology with respect to routing behaviors. Connected-vehicle technology provides a great opportunity to imple-ment an efficient and intelligent routing system. To this end, we propose a conceptual navigation model based on a fleet of AVs that are centrally dispatched over a network seeking system optimization. This study contributes to the literature on two fronts: (i) it attempts to shed light on future opportunities as well as possible hurdles associated with AV technology;and (ii) it conceptualizes a navigation model for the AV which leads to highly efficient traffic circulations.

  11. Considerations concerning the secure transport of radioactive materials in Romania

    International Nuclear Information System (INIS)

    Vieru, Gheorghe

    2002-01-01

    As UNO member and founding member of the IAEA, Romania has implemented national regulations concerning the transport of radioactive materials in complete safety, complying with recommendations by IAEA and other international organizations. Accordingly, the National Commission for Nuclear Activities Control, CNCAN, issued the Directive no. 374/October 2001 which provides the rules for secure radioactive material transport in Romania on roads, rail ways, sea/fluvial and air ways. The paper presents the main sources of producing radioactive materials focussing the following: mining of natural uranium ore, nuclear fuel fabrication plants, nuclear power plants operation, nuclear research reactors, industrial use of radioactive sources (as gamma radiography), use of radioisotope in scientific, educational or medical units. The paper pays attention to the special routes and containers adopted for most secure transport of radioactive waste. Finally, one presents specific issues relating to identification and evaluation of the risk factors occurring at the transport of radioactive waste, as well as the potential radiological consequences upon population and environment. Estimated are the collective risk doses for different categories of populations from areas adjacent to the routes of radioactive materials transportation. It is stressed that the annual collective dose which the population is exposed to in case of accident is comparable with the dose from the natural (cosmic radiation background)

  12. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  13. The Impact of Road Transporter Development Trajectory onto Cargo Safety and Security

    Directory of Open Access Journals (Sweden)

    Márton Lányi

    2018-03-01

    Full Text Available This article attempts to reveal the general behavioural norms of cargo carriers, with a predominant emphasis on security issues. The security awareness level of road transporters has been found hugely dependent on management capabilities. Additionally, this poses a risk factor indicative of a shipment load's quantity and value. At a certain level of road transporter development trajectory, broad research delineates a sharp increase in security awareness, stemming from leadership recognition at larger companies. The results of the following research findings are significantly similar to various well respected scientific theories which verify the hypothesis that the principal barrier to developing a company is a combination of a lack of management capabilities and an unwillingness to adapt to change.

  14. Secure Autonomous Automated Scheduling (SAAS). Rev. 1.1

    Science.gov (United States)

    Walke, Jon G.; Dikeman, Larry; Sage, Stephen P.; Miller, Eric M.

    2010-01-01

    This report describes network-centric operations, where a virtual mission operations center autonomously receives sensor triggers, and schedules space and ground assets using Internet-based technologies and service-oriented architectures. For proof-of-concept purposes, sensor triggers are received from the United States Geological Survey (USGS) to determine targets for space-based sensors. The Surrey Satellite Technology Limited (SSTL) Disaster Monitoring Constellation satellite, the UK-DMC, is used as the space-based sensor. The UK-DMC's availability is determined via machine-to-machine communications using SSTL's mission planning system. Access to/from the UK-DMC for tasking and sensor data is via SSTL's and Universal Space Network's (USN) ground assets. The availability and scheduling of USN's assets can also be performed autonomously via machine-to-machine communications. All communication, both on the ground and between ground and space, uses open Internet standards

  15. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  16. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  17. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  18. Data analysis-based autonomic bandwidth adjustment in software defined multi-vendor optical transport networks.

    Science.gov (United States)

    Li, Yajie; Zhao, Yongli; Zhang, Jie; Yu, Xiaosong; Jing, Ruiquan

    2017-11-27

    Network operators generally provide dedicated lightpaths for customers to meet the demand for high-quality transmission. Considering the variation of traffic load, customers usually rent peak bandwidth that exceeds the practical average traffic requirement. In this case, bandwidth provisioning is unmetered and customers have to pay according to peak bandwidth. Supposing that network operators could keep track of traffic load and allocate bandwidth dynamically, bandwidth can be provided as a metered service and customers would pay for the bandwidth that they actually use. To achieve cost-effective bandwidth provisioning, this paper proposes an autonomic bandwidth adjustment scheme based on data analysis of traffic load. The scheme is implemented in a software defined networking (SDN) controller and is demonstrated in the field trial of multi-vendor optical transport networks. The field trial shows that the proposed scheme can track traffic load and realize autonomic bandwidth adjustment. In addition, a simulation experiment is conducted to evaluate the performance of the proposed scheme. We also investigate the impact of different parameters on autonomic bandwidth adjustment. Simulation results show that the step size and adjustment period have significant influences on bandwidth savings and packet loss. A small value of step size and adjustment period can bring more benefits by tracking traffic variation with high accuracy. For network operators, the scheme can serve as technical support of realizing bandwidth as metered service in the future.

  19. Substantiating the Target Level of Economic Security of Transport Enterprises and the Instrumentarium for Its Provision

    Directory of Open Access Journals (Sweden)

    Lebedko Sergiy A.

    2017-10-01

    Full Text Available The article is aimed at substantiating the methodology for assessing the economic security of transport enterprises, determining the target level and the instrumentarium for its provision. The proposed methodical approach to the assessment of the level of economic security of transport enterprises includes the determination of the level of counteracting threats and is based on the principles of integral estimation. The formed integrated indicator includes both indicators of counteracting the internal (human, managerial and technological, force majeure, financial and external threats (market, stakeholder, power-based, natural, infrastructural. Each measure of counteracting threats is determined by results of assessment of dynamics of the three indicators. A practical testing of the proposed approach is carried out in the case of transport enterprises. Based on the established equation of the regression relationship between the level of economic security and the financial strength, a target level of economic security of transport enterprises has been substantiated. The instrumentarium to provide a targeted level of economic security according to the threat types, including preventive and reactive measures, has been developed.

  20. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  1. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  2. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  3. ADRES : autonomous decentralized regenerative energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Brauner, G.; Einfalt, A.; Leitinger, C.; Tiefgraber, D. [Vienna Univ. of Technology (Austria)

    2007-07-01

    The autonomous decentralized regenerative energy systems (ADRES) research project demonstrates that decentralized network independent microgrids are the target power systems of the future. This paper presented a typical structure of a microgrid, demonstrating that all types of generation available can be integrated, from wind and small hydro to photovoltaic, fuel cell, biomass or biogas operated stirling motors and micro turbines. In grid connected operation the balancing energy and reactive power for voltage control will come from the public grid. If there is no interconnection to a superior grid, it will form an autonomous micro grid. In order to reduce peak power demand and base energy, autonomous microgrid technology requires highly efficient appliances. Otherwise large collector design, high storage and balancing generation capacities would be necessary, which would increase costs. End-use energy efficiency was discussed with reference to demand side management (DSM) strategies that match energy demand with actual supply in order to minimize the storage size needed. This paper also discussed network controls that comprise active and reactive power. Decentralized robust algorithms were investigated with reference to black-start ability and congestion management features. It was concluded that the trend to develop small decentralized grids in parallel to existing large systems will improve security of supply and reduce greenhouse gas emissions. Decentralized grids will also increase energy efficiency because regenerative energy will be used where it is collected in the form of electricity and heat, thus avoiding transport and the extension of transmission lines. Decentralized energy technology is now becoming more economic by efficient and economic mass production of components. Although decentralized energy technology requires energy automation, computer intelligence is becoming increasingly cost efficient. 2 refs., 4 figs.

  4. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  5. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    Science.gov (United States)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  6. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  7. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  8. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  9. Editorial for special issue on Perception and Navigation for Autonomous Vehicles

    OpenAIRE

    Laugier , Christian; Philippe , Martinet; Urbano , Nunes

    2014-01-01

    International audience; This Special Issue of the IEEE Robotics and Automation Magazine has been prepared in the scope of the activities of the Technical Committee on "Autonomous Ground Vehicle and Intelligent Transportation System" (AGV-ITS) (http://www.ieee-ras.org/autonomous-groundvehicles- and-intelligent-transportation-systems) of the IEEE Robotics and Automation Society (IEEE RAS).

  10. Legal Framework and Best Practice for Improving Transport Security of Radioactive and Nuclear Materials in Croatia

    International Nuclear Information System (INIS)

    Ilijas, B.; Medakovic, S.

    2012-01-01

    Security of transporting radioactive and nuclear materials always poses a demanding task to the holder of the authorization or beneficiary, and especially transporter. Very strict and precise legal framework must be done for this purpose, yet it has not be too complicated to create a great problems in practice. The best balance between efficiency and simplicity should be achieved. In Croatia on power is 'The Dangerous Goods Transport Act' which stipulates the conditions for the carriage of dangerous goods in individual transport modes, obligations of persons participating in the carriage, requirements for packaging and vehicles, conditions for the appointment of safety advisers and safety adviser's rights and duties, competence and conditions for the implementation of training programs for persons participating in transport, competence of the state authorities related to such carriage and supervision of the implementation of the Act. Besides this Act, which regulates the issue in more general way, in preparation is a new 'Ordinance on Physical Security Measures for Radioactive Sources, Nuclear Material and Nuclear Facilities'. The intention of this Ordinance, in the part dealing with transport, is to bring specific approach, in accordance with IAEA guides, forwarding the most of obligations to the holder of the authorization or beneficiary and transporter, leaving state regulatory bodies mostly supervising role. In practice this can create some problems in the beginning, but with rising security awareness and after some experience collected, this can be the best way to achieve satisfactory security, yet not slowing down and complicating regular jobs with radioactive and nuclear materials.(author).

  11. Perception, Planning, Control, and Coordination for Autonomous Vehicles

    Directory of Open Access Journals (Sweden)

    Scott Drew Pendleton

    2017-02-01

    Full Text Available Autonomous vehicles are expected to play a key role in the future of urban transportation systems, as they offer potential for additional safety, increased productivity, greater accessibility, better road efficiency, and positive impact on the environment. Research in autonomous systems has seen dramatic advances in recent years, due to the increases in available computing power and reduced cost in sensing and computing technologies, resulting in maturing technological readiness level of fully autonomous vehicles. The objective of this paper is to provide a general overview of the recent developments in the realm of autonomous vehicle software systems. Fundamental components of autonomous vehicle software are reviewed, and recent developments in each area are discussed.

  12. Developing Policy for Urban Autonomous Vehicles: Impact on Congestion

    Directory of Open Access Journals (Sweden)

    David Metz

    2018-04-01

    Full Text Available An important problem for surface transport is road traffic congestion, which is ubiquitous and difficult to mitigate. Accordingly, a question for policymakers is the possible impact on congestion of autonomous vehicles. It seems likely that the main impact of vehicle automation will not be seen until driverless vehicles are sufficiently safe for use amid general traffic on urban streets. Shared use driverless vehicles could reduce the cost of taxis and a wider range of public transport vehicles could be economic. Individually owned autonomous vehicles would have the ability to travel unoccupied and may need to be regulated where this might add to congestion. It is possible that autonomous vehicles could provide mobility services at lower cost and wider scope, such that private car use in urban areas could decline and congestion reduce. City authorities should be alert to these possibilities in developing transport policy.

  13. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-03-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  14. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-06-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  15. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  16. Internetting tactical security sensor systems

    Science.gov (United States)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  17. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  18. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  19. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  20. Applications of autonomous robots in safety and security

    CSIR Research Space (South Africa)

    Sabatta, D

    2012-10-01

    Full Text Available stream_source_info Sabatta_2012.pdf.txt stream_content_type text/plain stream_size 7596 Content-Encoding ISO-8859-1 stream_name Sabatta_2012.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Applications of Autonomous... ? This is a typical slide with space for headline and body text ? Pictures may be included ? Do not use fonts smaller than 18pts ? Do not use headlines with fonts smaller than 24pts ? CSIR 2012 Slide 19 A simple slide layout ? This is a typical slide...

  1. Dual-Beam Antenna Design for Autonomous Sensor Network Applications

    Directory of Open Access Journals (Sweden)

    Jean-Marie Floc'h

    2012-01-01

    Full Text Available This paper describes our contribution in the ANR project called CAPNET dedicated to the site security (autonomous sensor network. The network is autonomous in term of energy and it is very easy to deploy on the site (the time to deploy each node of the network is around 10 minutes. The first demonstrator was deployed in the fire base station of Brest, France with 10 nodes with a security perimeter around 1.5 km. Our contribution takes place in the field of antennas, with the development of two systems: a single-beam antenna reserved for the supervisor or the last node of the network, and a dual-beam antenna dedicated to the node in linear configuration. For the design and optimization of antennas, we use HFSS CAD software from ANSOFT. The antennas have been designed and successfully measured.

  2. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  3. Autonomous vehicles: from paradigms to technology

    Science.gov (United States)

    Ionita, Silviu

    2017-10-01

    Mobility is a basic necessity of contemporary society and it is a key factor in global economic development. The basic requirements for the transport of people and goods are: safety and duration of travel, but also a number of additional criteria are very important: energy saving, pollution, passenger comfort. Due to advances in hardware and software, automation has penetrated massively in transport systems both on infrastructure and on vehicles, but man is still the key element in vehicle driving. However, the classic concept of ‘human-in-the-loop’ in terms of ‘hands on’ in driving the cars is competing aside from the self-driving startups working towards so-called ‘Level 4 autonomy’, which is defined as “a self-driving system that does not requires human intervention in most scenarios”. In this paper, a conceptual synthesis of the autonomous vehicle issue is made in connection with the artificial intelligence paradigm. It presents a classification of the tasks that take place during the driving of the vehicle and its modeling from the perspective of traditional control engineering and artificial intelligence. The issue of autonomous vehicle management is addressed on three levels: navigation, movement in traffic, respectively effective maneuver and vehicle dynamics control. Each level is then described in terms of specific tasks, such as: route selection, planning and reconfiguration, recognition of traffic signs and reaction to signaling and traffic events, as well as control of effective speed, distance and direction. The approach will lead to a better understanding of the way technology is moving when talking about autonomous cars, smart/intelligent cars or intelligent transport systems. Keywords: self-driving vehicle, artificial intelligence, deep learning, intelligent transport systems.

  4. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  5. Models Supporting Trajectory Planning in Autonomous Vehicles

    OpenAIRE

    Ward, Erik

    2018-01-01

    Autonomous vehicles have the potential to drastically improve the safety, efficiency and cost of transportation. Instead of a driver, an autonomous vehicle is controlled by an algorithm, offering improved consistency and the potential to eliminate human error from driving: by far the most common cause of accidents. Data collected from different types of sensors, along with prior information such as maps, are used to build models of the surrounding traffic scene, encoding relevant aspects of t...

  6. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    Science.gov (United States)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  7. Potential contribution of bioethanol fuel to the transport sector of Vojvodina

    International Nuclear Information System (INIS)

    Dodic, Sinisa N.; Popov, Stevan D.; Dodic, Jelena M.; Rankovic, Jovana A.; Zavargo, Zoltan Z.

    2009-01-01

    The Autonomous Province of Vojvodina is an Autonomous Province in Serbia and it is an energy-deficient country. The indigenous reserves of oil and gas are limited and the country is heavily dependent on the import of oil. The oil import bill is a serious strain on the country's economy and has been deteriorating the balance of payments situation. The country has become increasingly more dependent on fossil fuels and its energy security hangs on the fragile supply of imported oil that is subject to disruptions and price volatility. The transport sector has a 26% share in the total commercial energy consumption in Vojvodina. About 0.62 million tons of gasoline were consumed by this sector in 2008. Gasoline consumption in the transport sector is also a major source of environmental degradation especially in urban areas. Consequently, Vojvodina needs to develop indigenous, environment-friendly energy resources, such as bioethanol, to meet its transport sector's energy needs. Vojvodina produces about 3 million tons of sugar beet every year. There is a vast potential for bioethanol production from molasses of sugar beet in the country. Bioethanol can be used in transport sector after blending with gasoline, in order to minimize gasoline consumption and associated economical and environmental impacts. This paper presents the assessment of the potential contribution of bioethanol in the transport sector of Vojvodina. It is concluded that 20% of annual gasoline consumption in transport sector could be met from ethanol by the year 2026. (author)

  8. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  9. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  10. Interpersonal communication and issues for autonomous vehicles.

    Science.gov (United States)

    2017-06-01

    Interpersonal roadway communication is a vital component of the transportation system. Road users communicate to coordinate movement and increase roadway safety. Future autonomous vehicle research needs to account for the role of interpersonal roadwa...

  11. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  12. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  13. The Human Element and Autonomous Ships

    Directory of Open Access Journals (Sweden)

    Sauli Ahvenjärvi

    2016-09-01

    Full Text Available The autonomous ship technology has become a “hot” topic in the discussion about more efficient, environmentally friendly and safer sea transportation solutions. The time is becoming mature for the introduction of commercially sensible solutions for unmanned and fully autonomous cargo and passenger ships. Safety will be the most interesting and important aspect in this development. The utilization of the autonomous ship technology will have many effects on the safety, both positive and negative. It has been announced that the goal is to make the safety of an unmanned ship better that the safety of a manned ship. However, it must be understood that the human element will still be present when fully unmanned ships are being used. The shore-based control of a ship contains new safety aspects and an interesting question will be the interaction of manned and unmanned ships in the same traffic area. The autonomous ship technology should therefore be taken into account on the training of seafarers. Also it should not be forgotten that every single control algorithm and rule of the internal decision making logic of the autonomously navigating ship has been designed and coded by a human software engineer. Thus the human element is present also in this point of the lifetime navigation system of the autonomous ship.

  14. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  15. Alleviating Autonomic Dysreflexia after Spinal Cord Injury

    Science.gov (United States)

    2017-12-01

    tracts originating from cortex, we may eventually be able to use cell transplantation as a bridge to promote targeted, functional axon regeneration ...13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS autonomic dysreflexia, spinal cord injury, transplantation, axon regeneration 16. SECURITY...different root causes – i.e. using neural precursor cells to restore more normal innervation of sympathetic preganglionic neurons and

  16. Science, technology and the future of small autonomous drones.

    Science.gov (United States)

    Floreano, Dario; Wood, Robert J

    2015-05-28

    We are witnessing the advent of a new era of robots - drones - that can autonomously fly in natural and man-made environments. These robots, often associated with defence applications, could have a major impact on civilian tasks, including transportation, communication, agriculture, disaster mitigation and environment preservation. Autonomous flight in confined spaces presents great scientific and technical challenges owing to the energetic cost of staying airborne and to the perceptual intelligence required to negotiate complex environments. We identify scientific and technological advances that are expected to translate, within appropriate regulatory frameworks, into pervasive use of autonomous drones for civilian applications.

  17. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  18. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  19. An Experimental Platform for Autonomous Bus Development

    Directory of Open Access Journals (Sweden)

    Héctor Montes

    2017-11-01

    Full Text Available Nowadays, with highly developed instrumentation, sensing and actuation technologies, it is possible to foresee an important advance in the field of autonomous and/or semi-autonomous transportation systems. Intelligent Transport Systems (ITS have been subjected to very active research for many years, and Bus Rapid Transit (BRT is one area of major interest. Among the most promising transport infrastructures, the articulated bus is an interesting, low cost, high occupancy capacity and friendly option. In this paper, an experimental platform for research on the automatic control of an articulated bus is presented. The aim of the platform is to allow full experimentation in real conditions for testing technological developments and control algorithms. The experimental platform consists of a mobile component (a commercial articulated bus fully instrumented and a ground test area composed of asphalt roads inside the Consejo Superior de Investigaciones Científicas (CSIC premises. This paper focuses also on the development of a human machine interface to ease progress in control system evaluation. Some experimental results are presented in order to show the potential of the proposed platform.

  20. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  1. Autonomous E-Mobility as a Service - Final Report

    OpenAIRE

    Pitera, Kelly; Marinelli, Giuseppe

    2017-01-01

    Mobility as a Service (MaaS) is a systems-oriented approach of integration of numerous transport services into a single, seamless mobility service using a technology platform. Building on MaaS to incorporate both electric and autonomous mobility, the concept of Autonomous E-Mobility as a Service (AE-MaaS) is examined within this project as a way to improve the environmental sustainability of urban mobility. Through a series of workshops and meetings, the aim was to understand the feasibility ...

  2. Ministerial Decree of 16 February 1976 relating to approval of the model certificate of financial security for the transport of radioactive materials

    International Nuclear Information System (INIS)

    1976-01-01

    This Decree by the Minister of Industry, Commerce and Crafts, in consultation with the Minister of Transport, approves the model certificate of financial security for the transport of nuclear materials. This type of certificate issued by nuclear insurers is intended to provide detailed information on the nature of the financial security for damage likely to be caused by the materials in the course of transport; it is required to supply the certificate according to the Paris Convention on Third Party Liability in the Field of Nuclear Energy, ratified by Italy in 1975. The standardised presentation of this certificate enables it to be used in international transport between countries parties to the Paris Convention as proof of the existence of the financial security. (N.E.A.)

  3. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  4. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  5. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  6. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  7. Transports of radioactive materials. Legal regulations, safety and security concepts, experience

    International Nuclear Information System (INIS)

    Schwarz, Guenther

    2012-01-01

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  8. Experimental Autonomous Road Vehicle with Logical Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Sergey Sergeevich Shadrin

    2017-01-01

    Full Text Available This article describes some technical issues regarding the adaptation of a production car to a platform for the development and testing of autonomous driving technologies. A universal approach to performing the reverse engineering of electric power steering (EPS for the purpose of external control is also presented. The primary objective of the related study was to solve the problem associated with the precise prediction of the dynamic trajectory of an autonomous vehicle. This was accomplished by deriving a new equation for determining the lateral tire forces and adjusting some of the vehicle parameters under road test conductions. A Mivar expert system was also integrated into the control system of the experimental autonomous vehicle. The expert system was made more flexible and effective for the present application by the introduction of hybrid artificial intelligence with logical reasoning. The innovation offers a solution to the major problem of liability in the event of an autonomous transport vehicle being involved in a collision.

  9. Sample handling and transport for the Secure Automated Fabrication line

    International Nuclear Information System (INIS)

    Sherrell, D.L.; Jensen, J.D.; Genoway, G.G.; Togesen, H.J.

    1983-06-01

    A totally automated system is described which packages, transports, receives, and unpackages sintered plutonium/uranium oxide fuel pellet samples to support automated chemical analysis equipment for the Secure Automated Fabrication (SAF) line. Samples are transferred 100 meters from the fuel production line to a different floor of the facility where automatic determinations are made for purposes of process control and fuel quality certification. The system automatically records identification numbers, net weights sent and received, and all other pertinent information such as fuel lot number, sample point, date, and time of day

  10. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  11. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  12. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  13. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    Science.gov (United States)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  14. [Occupational injury in foreign workers by economic activity and autonomous community (Spain 2005)].

    Science.gov (United States)

    López-Jacob, Ma José; Ahonen, Emily; García, Ana M; Gil, Angel; Benavides, Fernando G

    2008-01-01

    While the immigrant collective in Spain has grown considerably in recent years, little is known about working conditions and their corresponding effects on occupational injury in this group. The objective of this study was to compare the incidences for both fatal and non-fatal injuries in foreign workers to that of Spanish workers in 2005, by autonomous community and economic activity. injury data came from the accident registry of the ministry of labor and social issues, and denominators were taken from available social security affiliation statistics from general and coal mining social security system. Incidence indices for fatal and non-fatal occupational injuries for foreign and spanish workers were calculated. In addition, relative risks and their 95% confidence intervals (95% CI) were calculated by autonomous community and economic activity, using spanish workers as the reference group. Overall, relative risk for occupational injury in foreign workers in 2005 was superior to base risk for both fatal (1.34; 95% CI: 1.11-1.62) and non-fatal injury (1.13; 95% CI: 1.13-1.14), though there were important differences by autonomous community and activity sectors. Compared with Spanish workers, risk for occupational injury was higher for foreign workers in industrial activities, while it was lower in construction, commerce and restaurants and hotels. By autonomous community, Aragón and Catalonia showed the highest risks for foreign workers. A higher risk for occupational injury among foreign workers is confirmed, and may be higher than that observed. The differences in risk among economic activities and autonomous communities require more detailed analysis.

  15. Profile formation and sustainment of autonomous tokamak plasma with current hole configuration

    International Nuclear Information System (INIS)

    Hayashi, N.; Takizuka, T.; Ozeki, T.

    2005-01-01

    We have investigated the profile formation and sustainment of tokamak plasmas with the current hole (CH) configuration by using 1.5D time-dependent transport simulations. A model of the current limit inside the CH on the basis of the Axisymmetric Tri-Magnetic-Islands equilibrium is introduced into the transport simulation. We found that a transport model with the sharp reduction of anomalous transport in the reversed-shear (RS) region can reproduce the time evolution of profiles observed in JT-60U experiments. The transport becomes neoclassical-level in the RS region, which results in the formation of profiles with internal transport barrier (ITB) and CH. The CH plasma has an autonomous property because of the strong interaction between a pressure profile and a current profile through the large bootstrap current fraction. The ITB width determined by the neoclassical-level transport agrees well with that measured in JT-60U. The energy confinement inside the ITB agrees with the scaling based on the JT-60U data. The scaling means the autonomous limitation of energy confinement in the CH plasma. The plasma with the large CH is sustained with the full current drive by the bootstrap current. The plasma with the small CH and the small bootstrap current fraction shrinks due to the penetration of inductive current. This shrink is prevented and the CH size can be controlled by the appropriate external current drive (CD). The CH plasma is found to respond autonomically to the external CD. (author)

  16. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  17. 49 CFR 8.31 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... industrial security services for the Department of Transportation. Regulations prescribed by the Secretary of...

  18. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  19. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  20. Autonomous Navigation and Obstacle Avoidance of a Micro-Bus

    Directory of Open Access Journals (Sweden)

    Carlos Fernández

    2013-04-01

    Full Text Available At present, the topic of automated vehicles is one of the most promising research areas in the field of Intelligent Transportation Systems (ITS. The use of automated vehicles for public transportation also contributes to reductions in congestion levels and to improvements in traffic flow. Moreover, electrical public autonomous vehicles are environmentally friendly, provide better air quality and contribute to energy conservation. The driverless public transportation systems, which are at present operating in some airports and train stations, are restricted to dedicated roads and exhibit serious trouble dynamically avoiding obstacles in the trajectory. In this paper, an electric autonomous mini-bus is presented. All datasets used in this article were collected during the experiments carried out in the demonstration event of the 2012 IEEE Intelligent Vehicles Symposium that took place in Alcalá de Henares (Spain. The demonstration consisted of a route 725 metres long containing a list of latitude-longitude points (waypoints. The mini-bus was capable of driving autonomously from one waypoint to another using a GPS sensor. Furthermore, the vehicle is provided with a multi-beam Laser Imaging Detection and Ranging (LIDAR sensor for surrounding reconstruction and obstacle detection. When an obstacle is detected in the planned path, the planned route is modified in order to avoid the obstacle and continue its way to the end of the mission. On the demonstration day, a total of 196 attendees had the opportunity to get a ride on the vehicles. A total of 28 laps were successfully completed in full autonomous mode in a private circuit located in the National Institute for Aerospace Research (INTA, Spain. In other words, the system completed 20.3 km of driverless navigation and obstacle avoidance.

  1. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    Science.gov (United States)

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  2. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  3. Autonomous driving technical, legal and social aspects

    CERN Document Server

    Gerdes, J; Lenz, Barbara; Winner, Hermann

    2016-01-01

    This book takes a look at fully automated, autonomous vehicles and discusses many open questions: How can autonomous vehicles be integrated into the current transportation system with diverse users and human drivers? Where do automated vehicles fall under current legal frameworks? What risks are associated with automation and how will society respond to these risks? How will the marketplace react to automated vehicles and what changes may be necessary for companies? Experts from Germany and the United States define key societal, engineering, and mobility issues related to the automation of vehicles. They discuss the decisions programmers of automated vehicles must make to enable vehicles to perceive their environment, interact with other road users, and choose actions that may have ethical consequences. The authors further identify expectations and concerns that will form the basis for individual and societal acceptance of autonomous driving. While the safety benefits of such vehicles are tremendous, the auth...

  4. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  5. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  6. Robotic security vehicle for exterior environments

    International Nuclear Information System (INIS)

    Klarer, P.R.; Workhoven, R.M.

    1988-01-01

    This paper describes a current effort at Sandia National Labs to develop an outdoor robotic vehicle capable of performing limited security functions autonomously in a structured environment. The present stage of development entails application of algorithms originally developed for the SIR vehicle to a testbed vehicle more appropriate to an outdoor environment. The current effort will culminate in a full scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. Various schemes for implementation of the robot system are discussed, as are plans for further development of the system

  7. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  8. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  9. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  10. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  11. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  12. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  13. Fleet management for autonomous vehicles

    OpenAIRE

    Bsaybes, Sahar; Quilliot, Alain; Wagler, Annegret K.

    2016-01-01

    The VIPAFLEET project consists in developing models and algorithms for man- aging a fleet of Individual Public Autonomous Vehicles (VIPA). Hereby, we consider a fleet of cars distributed at specified stations in an industrial area to supply internal transportation, where the cars can be used in different modes of circulation (tram mode, elevator mode, taxi mode). One goal is to develop and implement suitable algorithms for each mode in order to satisfy all the requests under an economic point...

  14. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  15. Autonomous Byte Stream Randomizer

    Science.gov (United States)

    Paloulian, George K.; Woo, Simon S.; Chow, Edward T.

    2013-01-01

    Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.

  16. Transport safety and struggle against malevolent acts: a synergy to be developed - Protecting transports against malevolent acts, Synergies between security and safety: lessons learned from the IAEA international conference, Role of the IRSN transport operational level in the field of safety, Transparency and secret in the field of nuclear material transport

    International Nuclear Information System (INIS)

    Riac, Christian; Flory, Denis; Loiseau, Olivier; Mermaz, Frederic; Demolins, Laurent

    2012-01-01

    The first article proposes an interview with the chief of the security department within the French ministry of Ecology, Sustainable Development, Transports and Housing who comments his missions and his relationships with the ASN and the French Home Office for the protection and control of nuclear materials. A second article discusses the lessons learned from an IAEA international conference about the relationship between the approaches to security and to safety. The third article briefly describes the role of the IRSN transport operational level in the field of safety. The last article discusses how opposite notions like transparency and secret are managed in the case of nuclear material transport

  17. Collective Modular Underwater Robotic System for Long-Term Autonomous Operation

    DEFF Research Database (Denmark)

    Christensen, David Johan; Andersen, Jens Christian; Blanke, Mogens

    This paper provides a brief overview of an underwater robotic system for autonomous inspection in confined offshore underwater structures. The system, which is currently in development, consist of heterogeneous modular robots able to physically dock and communicate with other robots, transport...

  18. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  19. Autonomic headache with autonomic seizures: a case report.

    Science.gov (United States)

    Ozge, Aynur; Kaleagasi, Hakan; Yalçin Tasmertek, Fazilet

    2006-10-01

    The aim of the report is to present a case of an autonomic headache associated with autonomic seizures. A 19-year-old male who had had complex partial seizures for 15 years was admitted with autonomic complaints and left hemicranial headache, independent from seizures, that he had had for 2 years and were provoked by watching television. Brain magnetic resonance imaging showed right hippocampal sclerosis and electroencephalography revealed epileptic activity in right hemispheric areas. Treatment with valproic acid decreased the complaints. The headache did not fulfil the criteria for the diagnosis of trigeminal autonomic cephalalgias, and was different from epileptic headache, which was defined as a pressing type pain felt over the forehead for several minutes to a few hours. Although epileptic headache responds to anti-epileptics and the complaints of the present case decreased with antiepileptics, it has been suggested that the headache could be a non-trigeminal autonomic headache instead of an epileptic headache.

  20. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  1. 75 FR 75621 - Office of Commercial Space Transportation; Waiver of Autonomous Reentry Restriction for a Reentry...

    Science.gov (United States)

    2010-12-06

    ... Dragon's reentry to Earth is in the public interest and will not jeopardize public health and safety... proposes that the FAA permit the autonomous reentry of a healthy Dragon at the nominal landing location in...; (2) the vehicle has the ability to autonomously guide itself to the same pre-determined landing site...

  2. Responsibility for crashes of autonomous vehicles: an ethical analysis.

    Science.gov (United States)

    Hevelke, Alexander; Nida-Rümelin, Julian

    2015-06-01

    A number of companies including Google and BMW are currently working on the development of autonomous cars. But if fully autonomous cars are going to drive on our roads, it must be decided who is to be held responsible in case of accidents. This involves not only legal questions, but also moral ones. The first question discussed is whether we should try to design the tort liability for car manufacturers in a way that will help along the development and improvement of autonomous vehicles. In particular, Patrick Lin's concern that any security gain derived from the introduction of autonomous cars would constitute a trade-off in human lives will be addressed. The second question is whether it would be morally permissible to impose liability on the user based on a duty to pay attention to the road and traffic and to intervene when necessary to avoid accidents. Doubts about the moral legitimacy of such a scheme are based on the notion that it is a form of defamation if a person is held to blame for causing the death of another by his inattention if he never had a real chance to intervene. Therefore, the legitimacy of such an approach would depend on the user having an actual chance to do so. The last option discussed in this paper is a system in which a person using an autonomous vehicle has no duty (and possibly no way) of interfering, but is still held (financially, not criminally) responsible for possible accidents. Two ways of doing so are discussed, but only one is judged morally feasible.

  3. Music Improves Subjective Feelings Leading to Cardiac Autonomic Nervous Modulation: A Pilot Study.

    Science.gov (United States)

    Kume, Satoshi; Nishimura, Yukako; Mizuno, Kei; Sakimoto, Nae; Hori, Hiroshi; Tamura, Yasuhisa; Yamato, Masanori; Mitsuhashi, Rika; Akiba, Keigo; Koizumi, Jun-Ichi; Watanabe, Yasuyoshi; Kataoka, Yosky

    2017-01-01

    It is widely accepted that listening to music improves subjective feelings and reduces fatigue sensations, and different kinds of music lead to different activations of these feelings. Recently, cardiac autonomic nervous modulation has been proposed as a useful objective indicator of fatigue. However, scientific considerations of the relation between feelings of fatigue and cardiac autonomic nervous modulation while listening to music are still lacking. In this study, we examined which subjective feelings of fatigue are related to participants' cardiac autonomic nervous function while they listen to music. We used an album of comfortable and relaxing environmental music, with blended sounds from a piano and violin as well as natural sound sources. We performed a crossover trial of environmental music and silent sessions for 20 healthy subjects, 12 females, and 8 males, after their daily work shift. We measured changes in eight types of subjective feelings, including healing, fatigue, sleepiness, relaxation, and refreshment, using the KOKORO scale, a subjective mood measurement system for self-reported feelings. Further, we obtained measures of cardiac autonomic nervous function on the basis of heart rate variability before and after the sessions. During the music session, subjective feelings significantly shifted toward healing and a secure/relaxed feeling and these changes were greater than those in the silent session. Heart rates (ΔHR) in the music session significantly decreased compared with those in the silent session. Other cardiac autonomic parameters such as high-frequency (HF) component and the ratio of low-frequency (LF) and HF components (LF/HF) were similar in the two sessions. In the linear regression analysis of the feelings with ΔHR and changes in LF/HF (ΔLF/HF), increases and decreases in ΔHR were correlated to the feeling axes of Fatigue-Healing and Anxiety/Tension-Security/Relaxation, whereas those in ΔLF/HF were related to the feeling axes

  4. Grants by Legislation of the RF Subjects for Citizens having Children (Omsk region and Khanty-Mansi autonomous district – Yugra

    Directory of Open Access Journals (Sweden)

    Sokolova N. A.

    2012-05-01

    Full Text Available The article is devoted to the analysis of Khanty-Mansi autonomous region – Yugra and the Omsk Region normative-legal acts in the social security sphere of citizens having children. The most important differences were distinguished in the social security levels of the families of these subjects of the Russian Federation

  5. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  6. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  7. 49 CFR 8.9 - Information Security Review Committee.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  8. Analysis of satisfaction factors at urban transport interchanges: Measuring travelers’ attitudes to information, security and waiting

    Energy Technology Data Exchange (ETDEWEB)

    Lois Garcia, D.; Monzon de Caceres, A.; Hernandez del Olmo, S.

    2016-07-01

    Transport interchanges can be considered as a node, where people transfer from one mode to another, and as a place to stay, using facilities and services as well as waiting areas. Reducing disruption of transfer in multimodal trips is a key element for assuring seamless mobility in big cities. Based on previous research (Hernández & Monzón, 2016) this paper aims to explore the predictive capacity of attitudes towards several service factors on general satisfaction with transport interchange. Complementary, it was analyzing how personal and trip characteristics are related to evaluation of some variables, and examining the influence of waiting time on the perceived quality. To that end, a two steps methodology was conducted (personal and on-line interview) in a representative sample of 740 users (54% female, 55% work purpose trip). We performed path analysis to test the model showing a satisfactory statistical fit. The model developed show good performance for predicting general satisfaction at Moncloa Transport Interchange (Madrid, Spain). The outputs of the model indicate that Information and Safety and Security factors predicted 49% of general satisfaction. Furthermore, the results showed also a strong association between evaluation of Design and Environmental quality, factors that not affect directly general satisfaction but do so through Information and Safety & Security perception, acting the last as mediator variables. Nevertheless, spending time queuing inside the interchange show a negative influence on Information and Safety & Security, while age of participants affect negatively to Information, which mean that elder have some cognitive accessibility problems. Moreover, our data shows gender differences in safety perception, since women feel less safe (particularity the youngest) inside the interchange. The results indicate a number of priority measures to enhance. (Author)

  9. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  10. Autonomic Neuropathy

    Science.gov (United States)

    ... risk of autonomic neuropathy. Other diseases. Amyloidosis, porphyria, hypothyroidism and cancer (usually due to side effects from treatment) may also increase the risk of autonomic neuropathy. ...

  11. Optimal Signal Design for Mixed Equilibrium Networks with Autonomous and Regular Vehicles

    Directory of Open Access Journals (Sweden)

    Nan Jiang

    2017-01-01

    Full Text Available A signal design problem is studied for efficiently managing autonomous vehicles (AVs and regular vehicles (RVs simultaneously in transportation networks. AVs and RVs move on separate lanes and two types of vehicles share the green times at the same intersections. The signal design problem is formulated as a bilevel program. The lower-level model describes a mixed equilibrium where autonomous vehicles follow the Cournot-Nash (CN principle and RVs follow the user equilibrium (UE principle. In the upper-level model, signal timings are optimized at signalized intersections to allocate appropriate green times to both autonomous and RVs to minimize system travel cost. The sensitivity analysis based method is used to solve the bilevel optimization model. Various signal control strategies are evaluated through numerical examples and some insightful findings are obtained. It was found that the number of phases at intersections should be reduced for the optimal control of the AVs and RVs in the mixed networks. More importantly, incorporating AVs into the transportation network would improve the system performance due to the value of AV technologies in reducing random delays at intersections. Meanwhile, travelers prefer to choose AVs when the networks turn to be congested.

  12. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  13. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  14. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  15. A Modular, Reusable Latch and Decking System for Securing Payloads During Launch and Planetary Surface Transport

    Science.gov (United States)

    Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.

    2011-01-01

    Efficient handling of payloads destined for a planetary surface, such as the moon or mars, requires robust systems to secure the payloads during transport on the ground, in space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been

  16. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  17. [Factors related to lack of autonomous mobility during out-of-hospital emergency care].

    Science.gov (United States)

    Montero García, Antonio; Morales Asencio, José Miguel; Trujillo Illescas, Juan Alfonso; Martí, Celia

    2016-10-01

    To explore the frequency of lack of autonomous mobility and factors related to it in patients requiring prehospital emergency services. Cross-sectional, observational, retrospective analysis. We identified a stratified random sample of patients attended by the public health emergency service of Andalusia in 2011. The sample included 280 patients with a mean age of 56 years; 63.9% were men. The majority were attended in homes and streets or other public spaces. Most were transported to a hospital in a mobile intensive care unit. The reasons for calling the service were most often related to chest pain or injuries. Loss of autonomous mobility was seen more often in men, when care was required in a public area, when there were injuries or altered vital signs, and when the patient required transport in a mobile intensive care unit. Dependence on others was significantly associated with the presence of a prior condition before the patient required transport (odds ratio [OR], 3.27; 95% CI, 1.60-6.33), the use of immobilization strategies (OR, 7.71; 95% CI, 1.7-34.96], and the use of ambulance transport (OR, 4.35; 95% CI, 1.63-11.60]. The following 2 variables were at the limit of significance: pain during the care process (OR, 1.13; 95% CI, 0.99-1.29) and age (OR, 0.46; 95% CI, 0.97-1.01). The profile we identified for patients and situations in which patients cannot move autonomously during prehospital emergency care can be used to plan preventive strategies to ensure patient safety.

  18. Genetic autonomic disorders.

    Science.gov (United States)

    Axelrod, Felicia B

    2013-03-01

    Genetic disorders affecting the autonomic nervous system can result in abnormal development of the nervous system or they can be caused by neurotransmitter imbalance, an ion-channel disturbance or by storage of deleterious material. The symptoms indicating autonomic dysfunction, however, will depend upon whether the genetic lesion has disrupted peripheral or central autonomic centers or both. Because the autonomic nervous system is pervasive and affects every organ system in the body, autonomic dysfunction will result in impaired homeostasis and symptoms will vary. The possibility of genetic confirmation by molecular testing for specific diagnosis is increasing but treatments tend to remain only supportive and directed toward particular symptoms. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152 RTG

    Science.gov (United States)

    2018-04-18

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  20. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Science.gov (United States)

    2018-04-01

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  1. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  2. Patients With Fibromyalgia Have Significant Autonomic Symptoms But Modest Autonomic Dysfunction.

    Science.gov (United States)

    Vincent, Ann; Whipple, Mary O; Low, Phillip A; Joyner, Michael; Hoskin, Tanya L

    2016-05-01

    Research suggests that disordered autonomic function may be one contributor to deconditioning reported in fibromyalgia; however, no study to date has assessed these variables simultaneously with comprehensive measures. To characterize physical fitness and autonomic function with the use of clinically validated measures and subjective questionnaires between patients with fibromyalgia and healthy controls. Cross-sectional, observational, controlled study. Community sample of patients with fibromyalgia and healthy controls. Thirty patients with fibromyalgia and 30 pain and fatigue-free controls. Participants completed a battery of self-report questionnaires and physiological measures, including clinically validated measures of physical fitness and autonomic function. Six-Minute Walk Test total distance, maximal oxygen consumption as assessed by cardiopulmonary exercise testing, total steps using activity monitor, Composite Autonomic Scoring Scale as assessed by Autonomic Reflex Screen, total metabolic equivalents per week using the International Physical Activity Questionnaire, and self-reported autonomic symptoms via the 31-item Composite Autonomic Symptom Score questionnaire. Autonomic function, as assessed by self-report, was significantly different between patients and controls (P physical activity was not significantly different between patients and controls (P = .99), but levels of moderate and vigorous physical activity as measured by actigraphy were significantly lower in patients (P = .012 and P = .047, respectively). Exercise capacity (6-Minute Walk) was poorer in patients (P = .0006), but there was no significant difference in maximal volume of oxygen consumption (P = .07). Patients with fibromyalgia report more severe symptoms across all domains, including physical activity and autonomic symptoms, compared with controls, but the objective assessments only showed modest differences. Our results suggest that patients with widespread subjective impairment of

  3. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  4. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  5. Surface transportation security : TSA has taken actions to manage risk, improve coordination, and measure performance, but additional actions would enhance its efforts, April 21, 2010.

    Science.gov (United States)

    2010-04-21

    Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...

  6. Securing the Aviation Transportation System

    Science.gov (United States)

    2007-12-01

    additional 100,000 airport workers who perform duties in sterile areas (the indoor gate area past the security check point).197 These same...containing thirteen handguns, an assault rifle and eight pounds of marijuana .270 However, two Federal Air Marshals were also onboard the aircraft.271

  7. Semi-Autonomous Systems Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — VisionThe Semi-Autonomous Systems Lab focuses on developing a comprehensive framework for semi-autonomous coordination of networked robotic systems. Semi-autonomous...

  8. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  9. 49 CFR 1510.7 - Air transportation advertisements and solicitations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Air transportation advertisements and solicitations. 1510.7 Section 1510.7 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE...

  10. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    International Nuclear Information System (INIS)

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  11. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  12. 49 CFR 193.2913 - Security monitoring.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  13. Cloud Incubator Car: A Reliable Platform for Autonomous Driving

    Directory of Open Access Journals (Sweden)

    Raúl Borraz

    2018-02-01

    Full Text Available It appears clear that the future of road transport is going through enormous changes (intelligent transport systems, the main one being the Intelligent Vehicle (IV. Automated driving requires a huge research effort in multiple technological areas: sensing, control, and driving algorithms. We present a comprehensible and reliable platform for autonomous driving technology development as well as for testing purposes, developed in the Intelligent Vehicles Lab at the Technical University of Cartagena. We propose an open and modular architecture capable of easily integrating a wide variety of sensors and actuators which can be used for testing algorithms and control strategies. As a proof of concept, this paper presents a reliable and complete navigation application for a commercial vehicle (Renault Twizy. It comprises a complete perception system (2D LIDAR, 3D HD LIDAR, ToF cameras, Real-Time Kinematic (RTK unit, Inertial Measurement Unit (IMU, an automation of the driving elements of the vehicle (throttle, steering, brakes, and gearbox, a control system, and a decision-making system. Furthermore, two flexible and reliable algorithms are presented for carrying out global and local route planning on board autonomous vehicles.

  14. Information Security and People: A Conundrum for Compliance

    Directory of Open Access Journals (Sweden)

    Hiep Cong Pham

    2017-01-01

    Full Text Available This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsically de-motivating rather than motivating end-users to become self-determined and self-regulating co-creators of a secure IT environment. The paper also discusses alternative approaches to developing a human system that works for end-users and experts.

  15. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  16. Surface Transportation Security Priority Assessment

    Science.gov (United States)

    2010-03-01

    intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States...Modernizing the information technology infrastructure used to vet the identity of travelers and transportation workers  Using terrorist databases to...examination of persons travelling , surface transportation modes tend to operate in a much more open environment, making it difficult to screen workers

  17. M and S supporting unmanned autonomous systems (UAxS) concept development and experimentation

    Science.gov (United States)

    Biagini, Marco; Scaccianoce, Alfio; Corona, Fabio; Forconi, Sonia; Byrum, Frank; Fowler, Olivia; Sidoran, James L.

    2017-05-01

    The development of the next generation of multi-domain unmanned semi and fully autonomous C4ISR systems involves a multitude of security concerns and interoperability challenges. Conceptual solutions to capability shortfalls and gaps can be identified through Concept Development and Experimentation (CD and E) cycles. Modelling and Simulation (M and S) is a key tool in supporting unmanned autonomous systems (UAxS) CD and E activities and addressing associated security challenges. This paper serves to illustrate the application of M and S to UAxS development and highlight initiatives made by the North Atlantic Treaty Organization (NATO) M and S Centre of Excellence (CoE) to facilitate interoperability. The NATO M and S CoE collaborates with other NATO and Nations bodies in order to develop UAxS projects such as the Allied Command for Transformation Counter Unmanned Autonomous Systems (CUAxS) project or the work of Science and Technology Organization (STO) panels. Some initiatives, such as Simulated Interactive Robotics Initiative (SIRI) made the baseline for further developments and to study emerging technologies in M and S and robotics fields. Artificial Intelligence algorithm modelling, Robot Operating Systems (ROS), network operations, cyber security, interoperable languages and related data models are some of the main aspects considered in this paper. In particular, the implementation of interoperable languages like C-BML and NIEM MilOps are discussed in relation to a Command and Control - Simulation Interoperability (C2SIM) paradigm. All these technologies are used to build a conceptual architecture to support UAxS CD and E.In addition, other projects that the NATO M and S CoE is involved in, such as the NATO Urbanization Project could provide credible future operational environments and benefit UAxS project development, as dual application of UAxS technology in large urbanized areas.In conclusion, this paper contains a detailed overview regarding how applying

  18. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  19. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  20. An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

    Science.gov (United States)

    Alomari, Firas

    2013-01-01

    The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…

  1. Security Infrastructure and Applicationsfor Mobile Agents

    OpenAIRE

    Shibli, Awais

    2010-01-01

    Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network...

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  4. Towards autonomous vehicular clouds

    Directory of Open Access Journals (Sweden)

    Stephan Olariu

    2011-09-01

    Full Text Available The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, autonomous vehicular clouds (AVCs. A key feature distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theaters of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities and smart electric power grids will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time and with right-sized resources.

  5. Characteristic Analysis of Mixed Traffic Flow of Regular and Autonomous Vehicles Using Cellular Automata

    Directory of Open Access Journals (Sweden)

    Yangzexi Liu

    2017-01-01

    Full Text Available The technology of autonomous vehicles is expected to revolutionize the operation of road transport systems. The penetration rate of autonomous vehicles will be low at the early stage of their deployment. It is a challenge to explore the effects of autonomous vehicles and their penetration on heterogeneous traffic flow dynamics. This paper aims to investigate this issue. An improved cellular automaton was employed as the modeling platform for our study. In particular, two sets of rules for lane changing were designed to address mild and aggressive lane changing behavior. With extensive simulation studies, we obtained some promising results. First, the introduction of autonomous vehicles to road traffic could considerably improve traffic flow, particularly the road capacity and free-flow speed. And the level of improvement increases with the penetration rate. Second, the lane-changing frequency between neighboring lanes evolves with traffic density along a fundamental-diagram-like curve. Third, the impacts of autonomous vehicles on the collective traffic flow characteristics are mainly related to their smart maneuvers in lane changing and car following, and it seems that the car-following impact is more pronounced.

  6. A changing European Security and defense architecture and its impact on Turkey

    OpenAIRE

    Yikilkan, Orhan.

    2001-01-01

    Since the 1991 Maastricht Treaty, the European Union countries have been trying to form a common security and defense identity as one facet of the European Union unification process. The efforts to create "separable but not separate" European forces within NATO have accelerated in the last three years and changed direction toward creating an autonomous "European Security and Defense Policy (ESDP)" within the framework of the EU. This policy concerns some non-EU European NATO allies, such as T...

  7. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    Science.gov (United States)

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake M.

    2013-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs…

  8. The course of paraventricular hypothalamic efferents to autonomic structures in medulla and spinal cord

    NARCIS (Netherlands)

    Luiten, P.G.M.; Horst, G.J. ter; Karst, H.; Steffens, A.B.

    1985-01-01

    By application of the anterograde transport technique of Phaseolus vulgaris leuco-agglutinin the descending autonomic projection of the paraventricular hypothalamic nucleus was investigated. The Phaseolus lectin technique allowed the detection of the cells of origin in the paraventricular PVN, the

  9. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  10. Testing for autonomic neuropathy

    DEFF Research Database (Denmark)

    Hilsted, J

    1984-01-01

    Autonomic neuropathy is a common complication in long-term diabetes, about 30% of the patients showing measurable signs of autonomic dysfunction after 10 years duration of disease. The diagnosis is often difficult to establish because clinical symptoms generally occur late in the course of the di......Autonomic neuropathy is a common complication in long-term diabetes, about 30% of the patients showing measurable signs of autonomic dysfunction after 10 years duration of disease. The diagnosis is often difficult to establish because clinical symptoms generally occur late in the course...

  11. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  12. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  13. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  14. The experience of WNTI with Safety and Security Worldwide

    International Nuclear Information System (INIS)

    Neau, Henry-Jacques

    2016-01-01

    This paper gives an industrial perspective on safety and security issues based on the experience of WNTI members. It describes how safety is invested primarily in the package; not how the package is transported. Transport safety is therefore an engineering challenge, and all necessary technical information is available to enable this to be met. Security in transport involves various measures to guard against intentional malicious acts. The paper describes the international instruments relevant to security in the transport of nuclear fuel cycle materials and how both safety and security regulations must be coordinated and simplified to avoid conflicts. It considers potential risks, which must not be underestimated. However, the assessment of risks must be realistic and quantified, and the requirements placed on the industry appropriate. It is important to dispel exaggerated perceptions of danger in the minds of the public, politicians and regulators. (author)

  15. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  16. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  17. Safety performance monitoring of autonomous marine systems

    International Nuclear Information System (INIS)

    Thieme, Christoph A.; Utne, Ingrid B.

    2017-01-01

    The marine environment is vast, harsh, and challenging. Unanticipated faults and events might lead to loss of vessels, transported goods, collected scientific data, and business reputation. Hence, systems have to be in place that monitor the safety performance of operation and indicate if it drifts into an intolerable safety level. This article proposes a process for developing safety indicators for the operation of autonomous marine systems (AMS). The condition of safety barriers and resilience engineering form the basis for the development of safety indicators, synthesizing and further adjusting the dual assurance and the resilience based early warning indicator (REWI) approaches. The article locates the process for developing safety indicators in the system life cycle emphasizing a timely implementation of the safety indicators. The resulting safety indicators reflect safety in AMS operation and can assist in planning of operations, in daily operational decision-making, and identification of improvements. Operation of an autonomous underwater vehicle (AUV) exemplifies the process for developing safety indicators and their implementation. The case study shows that the proposed process leads to a comprehensive set of safety indicators. It is expected that application of the resulting safety indicators consequently will contribute to safer operation of current and future AMS. - Highlights: • Process for developing safety indicators for autonomous marine systems. • Safety indicators based on safety barriers and resilience thinking. • Location of the development process in the system lifecycle. • Case study on AUV demonstrating applicability of the process.

  18. Digital watermarking for secure and adaptive teleconferencing

    Science.gov (United States)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  19. Overview of the Autonomic Nervous System

    Science.gov (United States)

    ... be reversible or progressive. Anatomy of the autonomic nervous system The autonomic nervous system is the part of ... organs they connect with. Function of the autonomic nervous system The autonomic nervous system controls internal body processes ...

  20. 49 CFR 234.211 - Security of warning system apparatus.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GRADE CROSSING SIGNAL SYSTEM SAFETY AND STATE ACTION PLANS Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus...

  1. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  2. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  3. Catecholamines and diabetic autonomic neuropathy

    DEFF Research Database (Denmark)

    Hilsted, J

    1995-01-01

    In diabetic patients with autonomic neuropathy plasma noradrenaline concentration, used as an index of sympathetic nervous activity, is low. This decrease is, however, only found in patients with a long duration of diabetes with clinically severe autonomic neuropathy. This apparent insensitivity...... of plasma catecholamine measurements is not due to changes in the clearance of catecholamines in diabetic autonomic neuropathy. The physiological responses to infused adrenaline and to noradrenaline are enhanced, for noradrenaline mainly cardiovascular responses. Adrenoceptors (alpha and beta adrenoceptors......) are not altered in circulating blood cells in diabetic autonomic neuropathy. Thus, a generalized up-regulation of adrenoceptors does not occur in diabetic autonomic neuropathy....

  4. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  5. Active matter logic for autonomous microfluidics

    Science.gov (United States)

    Woodhouse, Francis G.; Dunkel, Jörn

    2017-04-01

    Chemically or optically powered active matter plays an increasingly important role in materials design, but its computational potential has yet to be explored systematically. The competition between energy consumption and dissipation imposes stringent physical constraints on the information transport in active flow networks, facilitating global optimization strategies that are not well understood. Here, we combine insights from recent microbial experiments with concepts from lattice-field theory and non-equilibrium statistical mechanics to introduce a generic theoretical framework for active matter logic. Highlighting conceptual differences with classical and quantum computation, we demonstrate how the inherent non-locality of incompressible active flow networks can be utilized to construct universal logical operations, Fredkin gates and memory storage in set-reset latches through the synchronized self-organization of many individual network components. Our work lays the conceptual foundation for developing autonomous microfluidic transport devices driven by bacterial fluids, active liquid crystals or chemically engineered motile colloids.

  6. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  7. Autonomic cardiac innervation

    Science.gov (United States)

    Hasan, Wohaib

    2013-01-01

    Autonomic cardiac neurons have a common origin in the neural crest but undergo distinct developmental differentiation as they mature toward their adult phenotype. Progenitor cells respond to repulsive cues during migration, followed by differentiation cues from paracrine sources that promote neurochemistry and differentiation. When autonomic axons start to innervate cardiac tissue, neurotrophic factors from vascular tissue are essential for maintenance of neurons before they reach their targets, upon which target-derived trophic factors take over final maturation, synaptic strength and postnatal survival. Although target-derived neurotrophins have a central role to play in development, alternative sources of neurotrophins may also modulate innervation. Both developing and adult sympathetic neurons express proNGF, and adult parasympathetic cardiac ganglion neurons also synthesize and release NGF. The physiological function of these “non-classical” cardiac sources of neurotrophins remains to be determined, especially in relation to autocrine/paracrine sustenance during development.   Cardiac autonomic nerves are closely spatially associated in cardiac plexuses, ganglia and pacemaker regions and so are sensitive to release of neurotransmitter, neuropeptides and trophic factors from adjacent nerves. As such, in many cardiac pathologies, it is an imbalance within the two arms of the autonomic system that is critical for disease progression. Although this crosstalk between sympathetic and parasympathetic nerves has been well established for adult nerves, it is unclear whether a degree of paracrine regulation occurs across the autonomic limbs during development. Aberrant nerve remodeling is a common occurrence in many adult cardiovascular pathologies, and the mechanisms regulating outgrowth or denervation are disparate. However, autonomic neurons display considerable plasticity in this regard with neurotrophins and inflammatory cytokines having a central regulatory

  8. Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications

    OpenAIRE

    Hazel Si Min Lim; Araz Taeihagh

    2018-01-01

    Amidst rapid urban development, sustainable transportation solutions are required to meet the increasing demands for mobility whilst mitigating the potentially negative social, economic, and environmental impacts. This study analyses autonomous vehicles (AVs) as a potential transportation solution for smart and sustainable development. We identified privacy and cybersecurity risks of AVs as crucial to the development of smart and sustainable cities and examined the steps taken by governments ...

  9. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  10. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-07-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  11. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    Mc Govern, D.E.

    1987-01-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  12. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-06-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided. 4 refs., 1 fig., 1 tab

  13. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  14. Metro Optical Networks for Homeland Security

    Science.gov (United States)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  15. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  16. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  17. Surveillance systems for intermodal transportation

    Science.gov (United States)

    Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas

    2015-05-01

    Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.

  18. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  19. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  20. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  1. 49 CFR 10.29 - Social Security numbers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Social Security numbers. 10.29 Section 10.29... INDIVIDUALS Maintenance of Records § 10.29 Social Security numbers. (a) No individual is denied any right... which is required by Federal statute; or (2) The disclosure of a Social Security number when such...

  2. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  3. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. Approach for Autonomous Control of Unmanned Aerial Vehicle Using Intelligent Agents for Knowledge Creation

    Science.gov (United States)

    Dufrene, Warren R., Jr.

    2004-01-01

    This paper describes the development of a planned approach for Autonomous operation of an Unmanned Aerial Vehicle (UAV). A Hybrid approach will seek to provide Knowledge Generation through the application of Artificial Intelligence (AI) and Intelligent Agents (IA) for UAV control. The applications of several different types of AI techniques for flight are explored during this research effort. The research concentration is directed to the application of different AI methods within the UAV arena. By evaluating AI and biological system approaches. which include Expert Systems, Neural Networks. Intelligent Agents, Fuzzy Logic, and Complex Adaptive Systems, a new insight may be gained into the benefits of AI and CAS techniques applied to achieving true autonomous operation of these systems. Although flight systems were explored, the benefits should apply to many Unmanned Vehicles such as: Rovers. Ocean Explorers, Robots, and autonomous operation systems. A portion of the flight system is broken down into control agents that represent the intelligent agent approach used in AI. After the completion of a successful approach, a framework for applying an intelligent agent is presented. The initial results from simulation of a security agent for communication are presented.

  6. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing concrete pipe? 393... Specific Securement Requirements by Commodity Type § 393.124 What are the rules for securing concrete pipe? (a) Applicability. (1) The rules in this section apply to the transportation of concrete pipe on...

  7. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  8. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  9. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  10. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... 49 Transportation 4 2010-10-01 2010-10-01 false Communications and security requirements. 236.1033... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  11. Transportation

    National Research Council Canada - National Science Library

    Adams, James; Carr, Ron; Chebl, Maroun; Coleman, Robert; Costantini, William; Cox, Robert; Dial, William; Jenkins, Robert; McGovern, James; Mueller, Peter

    2006-01-01

    ...., trains, ships, etc.) and maximizing intermodal efficiency. A healthy balance must be achieved between the flow of international commerce and security requirements regardless of transportation mode...

  12. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  13. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  14. Insights into the background of autonomic medicine.

    Science.gov (United States)

    Laranjo, Sérgio; Geraldes, Vera; Oliveira, Mário; Rocha, Isabel

    2017-10-01

    Knowledge of the physiology underlying the autonomic nervous system is pivotal for understanding autonomic dysfunction in clinical practice. Autonomic dysfunction may result from primary modifications of the autonomic nervous system or be secondary to a wide range of diseases that cause severe morbidity and mortality. Together with a detailed history and physical examination, laboratory assessment of autonomic function is essential for the analysis of various clinical conditions and the establishment of effective, personalized and precise therapeutic schemes. This review summarizes the main aspects of autonomic medicine that constitute the background of cardiovascular autonomic dysfunction. Copyright © 2017 Sociedade Portuguesa de Cardiologia. Publicado por Elsevier España, S.L.U. All rights reserved.

  15. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  16. Enabling autonomous control for space reactor power systems

    International Nuclear Information System (INIS)

    Wood, R. T.

    2006-01-01

    The application of nuclear reactors for space power and/or propulsion presents some unique challenges regarding the operations and control of the power system. Terrestrial nuclear reactors employ varying degrees of human control and decision-making for operations and benefit from periodic human interaction for maintenance. In contrast, the control system of a space reactor power system (SRPS) employed for deep space missions must be able to accommodate unattended operations due to communications delays and periods of planetary occlusion while adapting to evolving or degraded conditions with no opportunity for repair or refurbishment. Thus, a SRPS control system must provide for operational autonomy. Oak Ridge National Laboratory (ORNL) has conducted an investigation of the state of the technology for autonomous control to determine the experience base in the nuclear power application domain, both for space and terrestrial use. It was found that control systems with varying levels of autonomy have been employed in robotic, transportation, spacecraft, and manufacturing applications. However, autonomous control has not been implemented for an operating terrestrial nuclear power plant nor has there been any experience beyond automating simple control loops for space reactors. Current automated control technologies for nuclear power plants are reasonably mature, and basic control for a SRPS is clearly feasible under optimum circumstances. However, autonomous control is primarily intended to account for the non optimum circumstances when degradation, failure, and other off-normal events challenge the performance of the reactor and near-term human intervention is not possible. Thus, the development and demonstration of autonomous control capabilities for the specific domain of space nuclear power operations is needed. This paper will discuss the findings of the ORNL study and provide a description of the concept of autonomy, its key characteristics, and a prospective

  17. Autonomic Nervous System Disorders

    Science.gov (United States)

    Your autonomic nervous system is the part of your nervous system that controls involuntary actions, such as the beating of your heart ... breathing and swallowing Erectile dysfunction in men Autonomic nervous system disorders can occur alone or as the result ...

  18. Measurements on an autonomous wireless payload at 635 km distance using a sensitive radio telescope

    NARCIS (Netherlands)

    Bentum, Marinus Jan; Leijtens, Johan; Verhoeven, Chris; van der Marel, Hans

    2011-01-01

    The Delfi-C3 spacecraft carries the first autonomous wireless payload in space. This payload is a wireless sun sensor developed by TNO in the Netherlands. The data captured by the sensor is wirelessly transported to the central computer system inside the spacecraft. Since no additional power supply

  19. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    OpenAIRE

    V. A. Nikolayev

    2012-01-01

    Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  20. Autonomous authority in relation to the staff regulations of autonomous parliaments

    Directory of Open Access Journals (Sweden)

    Rafael Cano Silva

    2018-04-01

    Full Text Available The statutes of Autonomous Parliaments are parliamentary administrative norms approved by each legislative chamber by virtue of their parliamentary autonomy. However, the parliamentary autonomy of each autonomous parliament does not have the same normative aspect for these purposes. It is studied in this article as despite having the Constitution as a common element, it is essential the special attribution that each autonomous chamber has and that the jurisprudence, both of the Constitutional Court, and that of the Supreme Court, has put in value, question that is included in the section related to the jurisprudence. In conclusion, the bureaucratic organization, in what refers to personal media, may be substantially different in each one of the legislative assemblies, as analyzed in the conclusions of this study.

  1. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  2. Emerging issues in transportation information infrastructure security

    Science.gov (United States)

    1996-07-31

    On October 26-27, 1995, over two hundred transportation leaders and decision-makers from around the nation convened in Cambridge, Massachusetts to participate in a two day symposium on "Challenges and Opportunities for Global Transportation in the 21...

  3. Certain aspects of ethnoconfessional reality in the Autonomous republic of Crimea

    OpenAIRE

    Bulatov, Ayder

    2008-01-01

    Implementation of the GUAM transnational energy transportation and communication project calls for a discussion of a vast range of issues related not merely to the political-legal, economic, and engineering spheres, which are indispensable for the project's adequate functioning, but also to other problems found far beyond the project's confines. I have in mind political stability, civil peace, and interfaith relations. The Autonomous Republic of Crimea is a strategically important part of the...

  4. Formal Verification of Autonomous Vehicle Platooning

    OpenAIRE

    Kamali, Maryam; Dennis, Louise A.; McAree, Owen; Fisher, Michael; Veres, Sandor M.

    2016-01-01

    The coordination of multiple autonomous vehicles into convoys or platoons is expected on our highways in the near future. However, before such platoons can be deployed, the new autonomous behaviors of the vehicles in these platoons must be certified. An appropriate representation for vehicle platooning is as a multi-agent system in which each agent captures the "autonomous decisions" carried out by each vehicle. In order to ensure that these autonomous decision-making agents in vehicle platoo...

  5. Vitamin D in the Spectrum of Prediabetes and Cardiovascular Autonomic Dysfunction.

    Science.gov (United States)

    Dimova, Rumyana; Tankova, Tsvetalina; Chakarova, Nevena

    2017-09-01

    Vitamin D is a fat-soluble secosteroid hormone with pleiotropic effects. 1,25-Dihydroxyvitamin D coordinates the biosynthesis of neurotransmitters in the central nervous system, which regulate cardiovascular autonomic function and may explain its putative role in the development of cardiovascular autonomic neuropathy (CAN). CAN is an independent risk factor for mortality in patients with diabetes and prediabetes and is associated with an increased risk of developing type 2 diabetes and cardiovascular disease. Accumulating data indicate the presence of peripheral nerve injury at these early stages of dysglycemia and its multifactorial pathogenesis. Prediabetes is associated with vitamin D insufficiency. Vitamin D is proposed to prevent the progression of glucose intolerance. The putative underlying mechanisms include maintenance of the intracellular calcium concentration, direct stimulation of insulin receptor expression, and enhancement of the insulin response to glucose transporters. Vitamin D exerts a protective effect on peripheral nerve fibers by decreasing the demyelination process and inducing axonal regeneration. The effects of vitamin D supplementation on glucose tolerance and related autonomic nerve dysfunction have been a recent focus of scientific interest. Although well-designed observational studies are available, the causative relation between vitamin D deficiency, glucose intolerance, and CAN is still debatable. One reason might be that interventional studies are unpersuasive with regard to the beneficial clinical effects of vitamin D supplementation. Because of its favorable side effect profile, vitamin D supplementation might represent an attractive therapeutic option for treating the pandemic prevalence of prediabetes and vitamin D deficiency. Vitamin D supplementation can improve glucose tolerance and cardiovascular autonomic function and can thus reduce cardiovascular mortality among subjects with different stages of glucose intolerance and

  6. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    Directory of Open Access Journals (Sweden)

    V. A. Nikolayev

    2012-01-01

    Full Text Available Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  7. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  8. Autonomous Landing on Moving Platforms

    KAUST Repository

    Mendoza Chavez, Gilberto

    2016-08-01

    This thesis investigates autonomous landing of a micro air vehicle (MAV) on a nonstationary ground platform. Unmanned aerial vehicles (UAVs) and micro air vehicles (MAVs) are becoming every day more ubiquitous. Nonetheless, many applications still require specialized human pilots or supervisors. Current research is focusing on augmenting the scope of tasks that these vehicles are able to accomplish autonomously. Precise autonomous landing on moving platforms is essential for self-deployment and recovery of MAVs, but it remains a challenging task for both autonomous and piloted vehicles. Model Predictive Control (MPC) is a widely used and effective scheme to control constrained systems. One of its variants, output-feedback tube-based MPC, ensures robust stability for systems with bounded disturbances under system state reconstruction. This thesis proposes a MAV control strategy based on this variant of MPC to perform rapid and precise autonomous landing on moving targets whose nominal (uncommitted) trajectory and velocity are slowly varying. The proposed approach is demonstrated on an experimental setup.

  9. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  10. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  11. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  12. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  13. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  14. How Can Autonomous and Connected Vehicles, Electromobility, BRT, Hyperloop, Shared Use Mobility and Mobility-As-A-Service Shape Transport Futures for the Context of Smart Cities?

    Directory of Open Access Journals (Sweden)

    Alexandros Nikitas

    2017-11-01

    Full Text Available A smarter transport system that caters for social, economic and environmental sustainability is arguably one of the most critical prerequisites for creating pathways to more livable urban futures. This paper aims to provide a state-of-the-art analysis of a selection of mobility initiatives that may dictate the future of urban transportation and make cities smarter. These are mechanisms either recently introduced with encouraging uptake so far and much greater potential to contribute in a shift to a better transport paradigm or still in an embryonic stage of their development and yet to be embraced as powerful mechanisms that could change travel behaviour norms. Autonomous and connected vehicles are set to revolutionise the urban landscape by allowing machines to take over driving that for over a century has been exclusively a human activity, while electrical vehicles are already helping decarbonising the transport sector. Bus rapid transit has been steadily reinventing and rebranding conventional bus services revitalising the use of the humblest form of public transport, while hyperloop is an entirely new, disruptive, and somewhat provocative, travel mode proposition based on the use of sealed tube systems through which pods could travel free of air resistance with speeds exceeding 1000 km/h. Shared use mobility mechanisms like car-sharing, ride-sharing, ride-sourcing and public bicycles can help establishing a culture for using mobility resources on an as-needed basis, while mobility-as-a-service will take this sharing culture a step further, offering tailored mobility and trip planning packages that could entirely replace the need for privately owned modes of transport.

  15. Autonomic Neuropathy in Diabetes Mellitus

    OpenAIRE

    Verrotti, Alberto; Prezioso, Giovanni; Scattoni, Raffaella; Chiarelli, Francesco

    2014-01-01

    Diabetic autonomic neuropathy (DAN) is a serious and common complication of diabetes, often overlooked and misdiagnosed. It is a systemic-wide disorder that may be asymptomatic in the early stages. The most studied and clinically important form of DAN is cardiovascular autonomic neuropathy defined as the impairment of autonomic control of the cardiovascular system in patients with diabetes after exclusion of other causes. The reported prevalence of DAN varies widely depending on inconsistent ...

  16. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  17. Autonomous Energy Grids: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, Benjamin D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Dall-Anese, Emiliano [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Bernstein, Andrey [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Zhang, Yingchen [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hodge, Brian S [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-04

    With much higher levels of distributed energy resources - variable generation, energy storage, and controllable loads just to mention a few - being deployed into power systems, the data deluge from pervasive metering of energy grids, and the shaping of multi-level ancillary-service markets, current frameworks to monitoring, controlling, and optimizing large-scale energy systems are becoming increasingly inadequate. This position paper outlines the concept of 'Autonomous Energy Grids' (AEGs) - systems that are supported by a scalable, reconfigurable, and self-organizing information and control infrastructure, can be extremely secure and resilient (self-healing), and self-optimize themselves in real-time for economic and reliable performance while systematically integrating energy in all forms. AEGs rely on scalable, self-configuring cellular building blocks that ensure that each 'cell' can self-optimize when isolated from a larger grid as well as partaking in the optimal operation of a larger grid when interconnected. To realize this vision, this paper describes the concepts and key research directions in the broad domains of optimization theory, control theory, big-data analytics, and complex system modeling that will be necessary to realize the AEG vision.

  18. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  19. Discerning non-autonomous dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Clemson, Philip T.; Stefanovska, Aneta, E-mail: aneta@lancaster.ac.uk

    2014-09-30

    Structure and function go hand in hand. However, while a complex structure can be relatively safely broken down into the minutest parts, and technology is now delving into nanoscales, the function of complex systems requires a completely different approach. Here the complexity clearly arises from nonlinear interactions, which prevents us from obtaining a realistic description of a system by dissecting it into its structural component parts. At best, the result of such investigations does not substantially add to our understanding or at worst it can even be misleading. Not surprisingly, the dynamics of complex systems, facilitated by increasing computational efficiency, is now readily tackled in the case of measured time series. Moreover, time series can now be collected in practically every branch of science and in any structural scale—from protein dynamics in a living cell to data collected in astrophysics or even via social networks. In searching for deterministic patterns in such data we are limited by the fact that no complex system in the real world is autonomous. Hence, as an alternative to the stochastic approach that is predominantly applied to data from inherently non-autonomous complex systems, theory and methods specifically tailored to non-autonomous systems are needed. Indeed, in the last decade we have faced a huge advance in mathematical methods, including the introduction of pullback attractors, as well as time series methods that cope with the most important characteristic of non-autonomous systems—their time-dependent behaviour. Here we review current methods for the analysis of non-autonomous dynamics including those for extracting properties of interactions and the direction of couplings. We illustrate each method by applying it to three sets of systems typical for chaotic, stochastic and non-autonomous behaviour. For the chaotic class we select the Lorenz system, for the stochastic the noise-forced Duffing system and for the non-autonomous

  20. Discerning non-autonomous dynamics

    International Nuclear Information System (INIS)

    Clemson, Philip T.; Stefanovska, Aneta

    2014-01-01

    Structure and function go hand in hand. However, while a complex structure can be relatively safely broken down into the minutest parts, and technology is now delving into nanoscales, the function of complex systems requires a completely different approach. Here the complexity clearly arises from nonlinear interactions, which prevents us from obtaining a realistic description of a system by dissecting it into its structural component parts. At best, the result of such investigations does not substantially add to our understanding or at worst it can even be misleading. Not surprisingly, the dynamics of complex systems, facilitated by increasing computational efficiency, is now readily tackled in the case of measured time series. Moreover, time series can now be collected in practically every branch of science and in any structural scale—from protein dynamics in a living cell to data collected in astrophysics or even via social networks. In searching for deterministic patterns in such data we are limited by the fact that no complex system in the real world is autonomous. Hence, as an alternative to the stochastic approach that is predominantly applied to data from inherently non-autonomous complex systems, theory and methods specifically tailored to non-autonomous systems are needed. Indeed, in the last decade we have faced a huge advance in mathematical methods, including the introduction of pullback attractors, as well as time series methods that cope with the most important characteristic of non-autonomous systems—their time-dependent behaviour. Here we review current methods for the analysis of non-autonomous dynamics including those for extracting properties of interactions and the direction of couplings. We illustrate each method by applying it to three sets of systems typical for chaotic, stochastic and non-autonomous behaviour. For the chaotic class we select the Lorenz system, for the stochastic the noise-forced Duffing system and for the non-autonomous

  1. A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Directory of Open Access Journals (Sweden)

    Jamal Talbi

    2017-03-01

    Full Text Available Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs increase and require secure, reliable and trustworthy cloud service providers (CSPs from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.

  2. Modeling with Robotran the autonomous electrical taxi and pushback operations of an Airbus A320

    OpenAIRE

    Quinet, Stéphane

    2017-01-01

    Nowadays, commercial flights are very close to a full automation while several means of transport already made the move. Civilian transport airplanes offer the possibility to fly in a fully automated mode from a few seconds after take-off to the exit of the runway - down to 60 knots- after landing. However, three flight sequences are not covered yet by an automated solution : the take-off, the taxi and the pushback. This work is a global approach of an autonomous taxi and pushback system impl...

  3. Structural Discrimination and Autonomous Vehicles

    DEFF Research Database (Denmark)

    Liu, Hin-Yan

    2016-01-01

    This paper examines the potential for structural discrimination to be woven into the fabric of autonomous vehicle developments, which remain underexplored and undiscussed. The prospect for structural discrimination arises as a result of the coordinated modes of autonomous vehicle behaviour...... individual identity, and potentially relative worth, to autonomous vehicles engaging in a crash damage calculus. At the risk of introducing these ideas into the development of autonomous vehicles, this paper hopes to spark a debate to foreclose these eventualities....... that is prescribed by its code. This leads to the potential for individuated outcomes to be networked and thereby multiplied consistently to any number of vehicles implementing such a code. The aggregated effects of such algorithmic policy preferences will thus cumulate in the reallocation of benefits and burdens...

  4. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  5. Enersec conference series. Nuclear energy and security (NUSEC). Book of abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Steinhaeusler, F; Heissl, C [Division of Physics and Biophysics, University of Salzburg, Hellbrunnerstrasse 34, Salzburg (Austria)

    2005-07-01

    Full text: After the terror attacks in the last years, the issue of security of nuclear power plants was raised, therefore members of national regulatory agencies, international organizations, and research institutions have engaged in the assessment of the security threats to nuclear facilities and the potential risks to man and the environment in the case of a successful terror attack. The risks range from the theft of nuclear material leading to illicit trafficking, to sabotage of nuclear power plants, and attacks on spent fuel transport resulting in an uncontrolled release of radioactivity. The NUSEC conference was focused on the security-related risks in the nuclear sector and its objective was to provide an overview of the currently available terrorism risk assessment methodology and international security approaches. Papers were presented in the following sessions: security of nuclear material, security of nuclear power plants, security of the transport of nuclear material, security of nuclear waste, national approaches to nuclear security and future outlook. (nevyjel)

  6. Enersec conference series. Nuclear energy and security (NUSEC). Book of abstracts

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Heissl, C.

    2005-01-01

    Full text: After the terror attacks in the last years, the issue of security of nuclear power plants was raised, therefore members of national regulatory agencies, international organizations, and research institutions have engaged in the assessment of the security threats to nuclear facilities and the potential risks to man and the environment in the case of a successful terror attack. The risks range from the theft of nuclear material leading to illicit trafficking, to sabotage of nuclear power plants, and attacks on spent fuel transport resulting in an uncontrolled release of radioactivity. The NUSEC conference was focused on the security-related risks in the nuclear sector and its objective was to provide an overview of the currently available terrorism risk assessment methodology and international security approaches. Papers were presented in the following sessions: security of nuclear material, security of nuclear power plants, security of the transport of nuclear material, security of nuclear waste, national approaches to nuclear security and future outlook. (nevyjel)

  7. Maritime supply chain security: Navigating through a sea of compliance requirements

    Directory of Open Access Journals (Sweden)

    Emma Maspero

    2008-11-01

    Full Text Available As a direct result of the 9-11 New York attack all modes of freight and passengertransportation were scrutinised for vulnerabilities. Over 90% of international trade takes place via sea transport for at least some part of the supply chain and as a result there has been a drive to better secure maritime transportation. This paper outlines the background to and the rationale behind the most important of the new security measures for maritime transportation and provides an overview of the likely implications for supply chain role-players. In addition the paper endeavours to create awareness of the importance of maritime supply chain security.

  8. Decentralized Control of Autonomous Vehicles

    Science.gov (United States)

    2003-01-01

    Autonomous Vehicles by John S. Baras, Xiaobo Tan, Pedram Hovareshti CSHCN TR 2003-8 (ISR TR 2003-14) Report Documentation Page Form ApprovedOMB No. 0704...AND SUBTITLE Decentralized Control of Autonomous Vehicles 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Decentralized Control of Autonomous Vehicles ∗ John S. Baras, Xiaobo Tan, and Pedram

  9. Public Health, Ethics, and Autonomous Vehicles.

    Science.gov (United States)

    Fleetwood, Janet

    2017-04-01

    With the potential to save nearly 30 000 lives per year in the United States, autonomous vehicles portend the most significant advance in auto safety history by shifting the focus from minimization of postcrash injury to collision prevention. I have delineated the important public health implications of autonomous vehicles and provided a brief analysis of a critically important ethical issue inherent in autonomous vehicle design. The broad expertise, ethical principles, and values of public health should be brought to bear on a wide range of issues pertaining to autonomous vehicles.

  10. Transports of radioactive materials. Legal regulations, safety and security concepts, experience; Befoerderung radioaktiver Stoffe. Rechtsvorschriften, Sicherheits- und Sicherungskonzept, Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Guenther

    2012-07-15

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  11. National transportation statistics 2010

    Science.gov (United States)

    2010-01-01

    National Transportation Statistics presents statistics on the U.S. transportation system, including its physical components, safety record, economic performance, the human and natural environment, and national security. This is a large online documen...

  12. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  13. 14 CFR 99.7 - Special security instructions.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Special security instructions. 99.7 Section 99.7 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SECURITY CONTROL OF AIR TRAFFIC General § 99.7 Special...

  14. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  15. Break-even analysis revisited: the need to adjust for profitability, the collection rate and autonomous income.

    Science.gov (United States)

    Broyles, R W; Narine, L; Khaliq, A

    2003-08-01

    This paper modifies traditional break-even analysis and develops a model that reflects the influence of variation in payer mix, the collection rate, profitability and autonomous income on the desired volume alternative. The augmented model indicates that a failure to adjust for uncollectibles and the net surplus results in a systematic understatement of the desired volume alternative. Conversely, a failure to adjust for autonomous income derived from the operation of cafeterias, gift shops or an organization's investment in marketable securities produces an overstatement of the desired volume. In addition, this paper uses Microsoft Excel to develop a spreadsheet that constructs a pro forma income statement, expressed in terms of the contribution margin. The spreadsheet also relies on the percentage of sales or revenue approach to prepare a balance sheet from which indicators of fiscal performance are calculated. Hence, the analysis enables the organization to perform a sensitivity analysis of potential changes in the desired volume, the operating margin, the current ratio, the debt: equity ratio and the amount of cash derived from operations that are associated with expected variation in payer mix, the collection rate, grouped by payer, the net surplus and autonomous income.

  16. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  17. On the security of SSL/TLS-enabled applications

    OpenAIRE

    Das, Manik Lal; Samdaria, Navkar

    2014-01-01

    SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of...

  18. Children's thoughts and feelings about their donor and security of attachment to their solo mothers in middle childhood.

    Science.gov (United States)

    Zadeh, S; Jones, C M; Basi, T; Golombok, S

    2017-04-01

    What is the relationship between children's thoughts and feelings about their donor and their security of attachment to their solo mothers in middle childhood? Children with higher levels of secure-autonomous attachment to their mothers were more likely to have positive perceptions of the donor, and those with higher levels of insecure-disorganized attachment to their mothers were more likely to perceive him negatively. There is limited understanding of the factors that contribute to children's thoughts and feelings about their donor in solo mother families. In adolescence, an association was found between adolescents' curiosity about donor conception and their security of attachment to their mothers. 19 children were administered the Friends and Family Interview and Donor Conception Interview between December 2015 and March 2016 as part of the second phase of a longitudinal, multi-method, multi-informant study of solo mother families. All children were aged between 7 and 13 years and had been conceived by donor insemination to solo mothers. Interviews were conducted in participants' homes. The Friends and Family Interview was rated according to a standardized coding scheme designed to measure security of attachment in terms of secure-autonomous, insecure-dismissing, insecure-preoccupied and insecure-disorganized attachment patterns. Quantitative analyses of the Donor Conception Interview yielded two factors: interest in the donor and perceptions of the donor. Qualitative analyses of the Donor Conception Interview were conducted using qualitative content analysis and thematic analysis. Statistically significant associations were found between the perception of the donor scale and the secure-autonomous and insecure-disorganized attachment ratings. Children with higher levels of secure-autonomous attachment to their mothers were more likely to have positive perceptions of the donor (r = 0.549, P = 0.015), and those with higher levels of insecure

  19. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  20. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  1. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  2. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  3. Handbook of SCADA/control systems security

    CERN Document Server

    Radvanovsky, Robert

    2013-01-01

    The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within

  4. Microglia PACAP and glutamate: Friends or foes in seizure-induced autonomic dysfunction and SUDEP?

    Science.gov (United States)

    Bhandare, Amol M; Kapoor, Komal; Farnham, Melissa M J; Pilowsky, Paul M

    2016-06-01

    Seizure-induced cardiorespiratory autonomic dysfunction is a major cause of sudden unexpected death in epilepsy (SUDEP), and the underlying mechanism is unclear. Seizures lead to increased synthesis, and release of glutamate, pituitary adenylate cyclase activating polypeptide (PACAP), and other neurotransmitters, and cause extensive activation of microglia at multiple regions in the brain including central autonomic cardiorespiratory brainstem nuclei. Glutamate contributes to neurodegeneration, and inflammation in epilepsy. PACAP has neuroprotective, and anti-inflammatory properties, whereas microglia are key players in inflammatory responses in CNS. Seizure-induced increase in PACAP is neuroprotective. PACAP produces neuroprotective effects acting on microglial PAC1 and VPAC1 receptors. Microglia also express glutamate transporters, and their expression can be increased by PACAP in response to harmful or stressful situations such as seizures. Here we discuss the mechanism of autonomic cardiorespiratory dysfunction in seizure, and the role of PACAP, glutamate and microglia in regulating cardiorespiratory brainstem neurons in their physiological state that could provide future therapeutic options for SUDEP. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Lightweight autonomous chemical identification system (LACIS)

    Science.gov (United States)

    Lozos, George; Lin, Hai; Burch, Timothy

    2012-06-01

    Smiths Detection and Intelligent Optical Systems have developed prototypes for the Lightweight Autonomous Chemical Identification System (LACIS) for the US Department of Homeland Security. LACIS is to be a handheld detection system for Chemical Warfare Agents (CWAs) and Toxic Industrial Chemicals (TICs). LACIS is designed to have a low limit of detection and rapid response time for use by emergency responders and could allow determination of areas having dangerous concentration levels and if protective garments will be required. Procedures for protection of responders from hazardous materials incidents require the use of protective equipment until such time as the hazard can be assessed. Such accurate analysis can accelerate operations and increase effectiveness. LACIS is to be an improved point detector employing novel CBRNE detection modalities that includes a militaryproven ruggedized ion mobility spectrometer (IMS) with an array of electro-resistive sensors to extend the range of chemical threats detected in a single device. It uses a novel sensor data fusion and threat classification architecture to interpret the independent sensor responses and provide robust detection at low levels in complex backgrounds with minimal false alarms. The performance of LACIS prototypes have been characterized in independent third party laboratory tests at the Battelle Memorial Institute (BMI, Columbus, OH) and indoor and outdoor field tests at the Nevada National Security Site (NNSS). LACIS prototypes will be entering operational assessment by key government emergency response groups to determine its capabilities versus requirements.

  6. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  7. Global chaos synchronization of three coupled nonlinear autonomous systems and a novel method of chaos encryption

    International Nuclear Information System (INIS)

    An Xinlei; Yu Jianning; Chu Yandong; Zhang Jiangang; Zhang Li

    2009-01-01

    In this paper, we discussed the fixed points and their linear stability of a new nonlinear autonomous system that introduced by J.C. Sprott. Based on Lyapunov stabilization theorem, a global chaos synchronization scheme of three coupled identical systems is investigated. By choosing proper coupling parameters, the states of all the three systems can be synchronized. Then this method was applied to secure communication through chaotic masking, used three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the previous two transmitters, information signal can be recovered exactly at the receiver end. Simulation results show that the method can realize monotonous synchronization. Further more, the information signal can be recovered undistorted when applying this method to secure communication.

  8. Development of Open Test-bed for Autonomous Operation in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Seungmin; Heo, Gyunyoung

    2017-01-01

    Nuclear power plants also recognize the need for automation. However, it is dangerous technology to have a significant impact on human society. In addition, due to the uncertain legal responsibility for autonomous operation, the application and development speed of nuclear energy related automation technology will be significantly decrease compared to other industries. It is argued that the application of AI and automation technology to power plants should not be prematurely applied or not based on the principle of applying proven technology since nuclear power plants are the highest level security operated facilities. As described above, the overall algorithm of the Test Bed is an autonomous operation algorithm (rulebased algorithm, learning-based algorithm, semiautonomous operation algorithm) to judge the entry condition of the procedure through condition monitoring and to enter the appropriate operating procedure. In order to make a test bed, the investigation for the heuristic part of the existing procedures and the heuristic part from the circumstance which is not specified in the procedure is needed. In the learning based and semi-autonomous operation algorithms, using MARS to extract its operating data and operational logs and try out various diagnostic algorithms as described above. Through the completion of these future tasks, the test bed which can compared with actual operators will be constructed and that it will be able to check its effectiveness by improving competitively with other research teams through the characteristics of shared platform.

  9. Behavioural domain knowledge transfer for autonomous agents

    CSIR Research Space (South Africa)

    Rosman, Benjamin S

    2014-11-01

    Full Text Available , and Behavior Transfer in Autonomous Robots, AAAI 2014 Fall Symposium Series, 13-15 November 2014 Behavioural Domain Knowledge Transfer for Autonomous Agents Benjamin Rosman Mobile Intelligent Autonomous Systems Modelling and Digital Science Council...

  10. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  11. Current challenges in autonomous vehicle development

    Science.gov (United States)

    Connelly, J.; Hong, W. S.; Mahoney, R. B., Jr.; Sparrow, D. A.

    2006-05-01

    The field of autonomous vehicles is a rapidly growing one, with significant interest from both government and industry sectors. Autonomous vehicles represent the intersection of artificial intelligence (AI) and robotics, combining decision-making with real-time control. Autonomous vehicles are desired for use in search and rescue, urban reconnaissance, mine detonation, supply convoys, and more. The general adage is to use robots for anything dull, dirty, dangerous or dumb. While a great deal of research has been done on autonomous systems, there are only a handful of fielded examples incorporating machine autonomy beyond the level of teleoperation, especially in outdoor/complex environments. In an attempt to assess and understand the current state of the art in autonomous vehicle development, a few areas where unsolved problems remain became clear. This paper outlines those areas and provides suggestions for the focus of science and technology research. The first step in evaluating the current state of autonomous vehicle development was to develop a definition of autonomy. A number of autonomy level classification systems were reviewed. The resulting working definitions and classification schemes used by the authors are summarized in the opening sections of the paper. The remainder of the report discusses current approaches and challenges in decision-making and real-time control for autonomous vehicles. Suggested research focus areas for near-, mid-, and long-term development are also presented.

  12. Radioactive material air transportation; Transporte aereo de material radioativo

    Energy Technology Data Exchange (ETDEWEB)

    Pader y Terry, Claudio Cosme [Varig Logistica (VARIGLOG), Sao Paulo, SP (Brazil)

    2002-07-01

    As function of the high aggregated value, safety regulations and the useful life time, the air transportation has been used more regularly because is fast, reliable, and by giving great security to the cargo. Based on the International Atomic Energy Agency (IAEA), the IATA (International Air Transportation Association) has reproduced in his dangerous goods manual (Dangerous Goods Regulations - DGR IATA), the regulation for the radioactive material air transportation. Those documents support this presentation.

  13. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  14. Compact autonomous navigation system (CANS)

    Science.gov (United States)

    Hao, Y. C.; Ying, L.; Xiong, K.; Cheng, H. Y.; Qiao, G. D.

    2017-11-01

    Autonomous navigation of Satellite and constellation has series of benefits, such as to reduce operation cost and ground station workload, to avoid the event of crises of war and natural disaster, to increase spacecraft autonomy, and so on. Autonomous navigation satellite is independent of ground station support. Many systems are developed for autonomous navigation of satellite in the past 20 years. Along them American MANS (Microcosm Autonomous Navigation System) [1] of Microcosm Inc. and ERADS [2] [3] (Earth Reference Attitude Determination System) of Honeywell Inc. are well known. The systems anticipate a series of good features of autonomous navigation and aim low cost, integrated structure, low power consumption and compact layout. The ERADS is an integrated small 3-axis attitude sensor system with low cost and small volume. It has the Earth center measurement accuracy higher than the common IR sensor because the detected ultraviolet radiation zone of the atmosphere has a brightness gradient larger than that of the IR zone. But the ERADS is still a complex system because it has to eliminate many problems such as making of the sapphire sphere lens, birefringence effect of sapphire, high precision image transfer optical fiber flattener, ultraviolet intensifier noise, and so on. The marginal sphere FOV of the sphere lens of the ERADS is used to star imaging that may be bring some disadvantages., i.e. , the image energy and attitude measurements accuracy may be reduced due to the tilt image acceptance end of the fiber flattener in the FOV. Besides Japan, Germany and Russia developed visible earth sensor for GEO [4] [5]. Do we have a way to develop a cheaper/easier and more accurate autonomous navigation system that can be used to all LEO spacecraft, especially, to LEO small and micro satellites? To return this problem we provide a new type of the system—CANS (Compact Autonomous Navigation System) [6].

  15. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

    Science.gov (United States)

    Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.

    2016-05-01

    The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.

  16. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  17. Human Supervision of Multiple Autonomous Vehicles

    Science.gov (United States)

    2013-03-22

    AFRL-RH-WP-TR-2013-0143 HUMAN SUPERVISION OF MULTIPLE AUTONOMOUS VEHICLES Heath A. Ruff Ball...REPORT TYPE Interim 3. DATES COVERED (From – To) 09-16-08 – 03-22-13 4. TITLE AND SUBTITLE HUMAN SUPERVISION OF MULTIPLE AUTONOMOUS VEHICLES 5a...Supervision of Multiple Autonomous Vehicles To support the vision of a system that enables a single operator to control multiple next-generation

  18. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Directory of Open Access Journals (Sweden)

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  19. A Priori User Acceptance and the Perceived Driving Pleasure in Semi-autonomous and Autonomous Vehicles

    DEFF Research Database (Denmark)

    Bjørner, Thomas

    The aim of this minor pilot study is, from a sociological user perspective, to explore a priori user acceptance and the perceived driving pleasure in semi- autonomous and autonomous vehicles. The methods used were 13 in-depth interviews while having participants watch video examples within four...... different scenarios. After each scenario, two different numerical rating scales were used. There was a tendency toward positive attitudes regarding semi- autonomous driving systems, especially the use of a parking assistant and while driving in city traffic congestion. However, there were also major...

  20. Transportation Security Leadership: The Right Stuff

    National Research Council Canada - National Science Library

    Burke, Karen

    2008-01-01

    .... transportation systems from terrorist threats. With the growing complexity and global nature of the terrorist networks, it requires leadership that is collaborative, integrative, and able to take a holistic leadership approach...

  1. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  2. 49 CFR 15.5 - Sensitive security information.

    Science.gov (United States)

    2010-10-01

    ... held by the Federal government concerning threats against transportation or transportation systems and..., including threat images and descriptions of threat images for threat image projection systems. (10) Security... systems operated by the Federal government that have been identified by the DOT or DHS as critical to...

  3. Autonomous Star Tracker Algorithms

    DEFF Research Database (Denmark)

    Betto, Maurizio; Jørgensen, John Leif; Kilsgaard, Søren

    1998-01-01

    Proposal, in response to an ESA R.f.P., to design algorithms for autonomous star tracker operations.The proposal also included the development of a star tracker breadboard to test the algorithms performances.......Proposal, in response to an ESA R.f.P., to design algorithms for autonomous star tracker operations.The proposal also included the development of a star tracker breadboard to test the algorithms performances....

  4. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  5. Distributed Cognition on the road: Using EAST to explore future road transportation systems.

    Science.gov (United States)

    Banks, Victoria A; Stanton, Neville A; Burnett, Gary; Hermawati, Setia

    2018-04-01

    Connected and Autonomous Vehicles (CAV) are set to revolutionise the way in which we use our transportation system. However, we do not fully understand how the integration of wireless and autonomous technology into the road transportation network affects overall network dynamism. This paper uses the theoretical principles underlying Distributed Cognition to explore the dependencies and interdependencies that exist between system agents located within the road environment, traffic management centres and other external agencies in both non-connected and connected transportation systems. This represents a significant step forward in modelling complex sociotechnical systems as it shows that the principles underlying Distributed Cognition can be applied to macro-level systems using the visual representations afforded by the Event Analysis of Systemic Teamwork (EAST) method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Effect of Sleep/Wake Cycle on Autonomic Regulation

    International Nuclear Information System (INIS)

    Jabeen, S.

    2015-01-01

    Objective: To evaluate the association between irregular sleep/wake cycle in shift workers and autonomic regulation. Study Design: Cross-sectional, analytical study. Place and Duration of Study: Dow University Hospital, Karachi, from August to November 2013. Methodology: All health care providers working in rotating shifts making a total (n=104) were included. Instrument was an integrated questionnaire applied to assess autonomic regulation, taken from Kroz et al. on scoring criteria, ranging from 18 - 54, where higher rating signifies strong autonomic regulation, indicating a stable Autonomic Nervous System (ANS) and vice versa. Participants were interviewed and their response was recorded by the investigator. Influence of sleep misalignment was measured quantitatively to extract index of autonomic activity. Results: There was a reduced trend in autonomic strength amongst shift workers. The mean score obtained on the Autonomic Scale was 37.8 ± 5.9. Conclusion: Circadian misalignment has an injurious influence on ANS which might be valuable in controlling autonomic dysfunction that leads to fatal triggers in rotating shift workers. (author)

  7. Physics Simulation Software for Autonomous Propellant Loading and Gas House Autonomous System Monitoring

    Science.gov (United States)

    Regalado Reyes, Bjorn Constant

    2015-01-01

    1. Kennedy Space Center (KSC) is developing a mobile launching system with autonomous propellant loading capabilities for liquid-fueled rockets. An autonomous system will be responsible for monitoring and controlling the storage, loading and transferring of cryogenic propellants. The Physics Simulation Software will reproduce the sensor data seen during the delivery of cryogenic fluids including valve positions, pressures, temperatures and flow rates. The simulator will provide insight into the functionality of the propellant systems and demonstrate the effects of potential faults. This will provide verification of the communications protocols and the autonomous system control. 2. The High Pressure Gas Facility (HPGF) stores and distributes hydrogen, nitrogen, helium and high pressure air. The hydrogen and nitrogen are stored in cryogenic liquid state. The cryogenic fluids pose several hazards to operators and the storage and transfer equipment. Constant monitoring of pressures, temperatures and flow rates are required in order to maintain the safety of personnel and equipment during the handling and storage of these commodities. The Gas House Autonomous System Monitoring software will be responsible for constantly observing and recording sensor data, identifying and predicting faults and relaying hazard and operational information to the operators.

  8. Mining in the Future: Autonomous Robotics for Safer Mines

    CSIR Research Space (South Africa)

    Shahdi, A

    2012-10-01

    Full Text Available ? Require less support infrastructure ? Advanced sensors ? CSIR 2012 Slide 4 Degree of Autonomy ? Teleoperation ? Semi-autonomous ? Autonomous ? CSIR 2012 Slide 5 Mobile Intelligent Autonomous Systems Group ? The Mobile Intelligent Autonomous...

  9. Radioactive materials transport

    International Nuclear Information System (INIS)

    Talbi, B.

    1996-01-01

    The development of peaceful applications of nuclear energy results in the increase of transport operations of radioactive materials. Therefore strong regulations on transport of radioactive materials turns out to be a necessity in Tunisia. This report presents the different axes of regulations which include the means of transport involved, the radiation protection of the carriers, the technical criteria of security in transport, the emergency measures in case of accidents and penalties in case of infringement. (TEC). 12 refs., 1 fig

  10. 49 CFR 174.9 - Safety and security inspection and acceptance.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Safety and security inspection and acceptance. 174... RAIL General Requirements § 174.9 Safety and security inspection and acceptance. (a) At each location... not conform to the safety and security requirements of this subchapter, the carrier may not forward or...

  11. From cooperative to autonomous vehicles

    NARCIS (Netherlands)

    van der Sande, T.P.J.; Nijmeijer, H.; Fossen, T.I.; Pettersen, K.Y.; Nijmeijer, H.

    2017-01-01

    What defines an autonomous vehicle? In this chapter the authors will try to answer this question and formulate the limitations of driver assistance systems as well as for—conditionally—autonomous vehicles . First a short summary of the levels of automation as provided by the society of automotive

  12. An Artificial Neural Network Controller for Intelligent Transportation Systems Applications

    Science.gov (United States)

    1996-01-01

    An Autonomous Intelligent Cruise Control (AICC) has been designed using a feedforward artificial neural network, as an example for utilizing artificial neural networks for nonlinear control problems arising in intelligent transportation systems appli...

  13. Enabling technologies for the prassi autonomous robot

    Energy Technology Data Exchange (ETDEWEB)

    Taraglio, S; Nanni, V [ENEA, Robotics and Information Technology Division, Rome (Italy)

    2001-07-01

    In this book are summarised some of the results of the PRASSI project as presented by the different partners of the effort. PRASSI is an acronym which stands for Autonomous Robotic Platform for the Security and Surveillance of plants, the Italian for it is 'Piattaforma Robotica per la Sorveglianza e Sicurezza d'Impianto'. This project has been funded by the Italian Ministry for the Education, the University and the Research (MIUR) in the framework of the project High Performance Computing Applied to Robotics (Calcolo Parallelo con Applicazioni alla Robotica) of the law 95/1995. The idea behind such an initiative is that of fostering the knowledge and possibly the use of high performance computing in the research and industrial community. In other words, robotic scientists are always simplifying their algorithms or using particular approaches (e.g. soft computing) in order to use standard processors for difficult sensorial data processing; well, what if an embedded parallel computer were available, with at least one magnitude more of computing power?.

  14. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  15. Safety and security of radioactive sources in industrial radiography in Bangladesh

    Energy Technology Data Exchange (ETDEWEB)

    Mollah, A. S.; Nazrul, M. Abdullah [Industrial Inspection Service Limited, Dhaka (Bangladesh)

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  16. Safety and security of radioactive sources in industrial radiography in Bangladesh

    International Nuclear Information System (INIS)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-01-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  17. Autonomous Learner Model Resource Book

    Science.gov (United States)

    Betts, George T.; Carey, Robin J.; Kapushion, Blanche M.

    2016-01-01

    "Autonomous Learner Model Resource Book" includes activities and strategies to support the development of autonomous learners. More than 40 activities are included, all geared to the emotional, social, cognitive, and physical development of students. Teachers may use these activities and strategies with the entire class, small groups, or…

  18. 49 CFR 659.29 - Oversight agency safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Oversight agency safety and security reviews. 659... Role of the State Oversight Agency § 659.29 Oversight agency safety and security reviews. At least... safety program plan and system security plan. Alternatively, the on-site review may be conducted in an on...

  19. Cybersecurity for aerospace autonomous systems

    Science.gov (United States)

    Straub, Jeremy

    2015-05-01

    High profile breaches have occurred across numerous information systems. One area where attacks are particularly problematic is autonomous control systems. This paper considers the aerospace information system, focusing on elements that interact with autonomous control systems (e.g., onboard UAVs). It discusses the trust placed in the autonomous systems and supporting systems (e.g., navigational aids) and how this trust can be validated. Approaches to remotely detect the UAV compromise, without relying on the onboard software (on a potentially compromised system) as part of the process are discussed. How different levels of autonomy (task-based, goal-based, mission-based) impact this remote characterization is considered.

  20. Decision from the Commission of Electricity Regulation (CRE) dated from May 2, 2002 about a dispute between the manager of the power transportation network (RTE) and the autonomous administration of Parisian transports (RATP) relative to the conditions of consideration of the multiplicity of power supply points in the contractual system of access to the power grid; Decision de la Commission de Regulation de l'Electricite (CRE) en date du 2 mai 2002 sur un different qui oppose le gestionnaire du Reseau de Transport d'Electricite (RTE) et la Regie Autonome des Transports Parisiens (RATP) relatif aux conditions de prise en compte de la multiplicite des points de livraison dans le dispositif contractuel d'acces au reseau electrique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-05-01

    This document is the analysis made by the French commission of electricity regulation (CRE) about a dispute between the French manager of the power transportation grid (RTE) and the autonomous administration of Parisian transports (RATP) about its contract of access to the grid for the power supply of the underground railway of Paris. The RATP requested a regrouping of all its 7 supply points in a single contract. After analysis of the hearings, the CRE considers that no discrimination exists in the contractual system proposed by the RTE and thus the RATP request has been rejected. (J.S.)

  1. Morphologic Changes in Autonomic Nerves in Diabetic Autonomic Neuropathy

    Directory of Open Access Journals (Sweden)

    Heung Yong Jin

    2015-12-01

    Full Text Available Diabetic neuropathy is one of the major complications of diabetes, and it increases morbidity and mortality in patients with both type 1 diabetes mellitus (T1DM and type 2 diabetes mellitus (T2DM. Because the autonomic nervous system, for example, parasympathetic axons, has a diffuse and wide distribution, we do not know the morphological changes that occur in autonomic neural control and their exact mechanisms in diabetic patients with diabetic autonomic neuropathy (DAN. Although the prevalence of sympathetic and parasympathetic neuropathy is similar in T1DM versus T2DM patients, sympathetic nerve function correlates with parasympathetic neuropathy only in T1DM patients. The explanation for these discrepancies might be that parasympathetic nerve function was more severely affected among T2DM patients. As parasympathetic nerve damage seems to be more advanced than sympathetic nerve damage, it might be that parasympathetic neuropathy precedes sympathetic neuropathy in T2DM, which was Ewing's concept. This could be explained by the intrinsic morphologic difference. Therefore, the morphological changes in the sympathetic and parasympathetic nerves of involved organs in T1DM and T2DM patients who have DAN should be evaluated. In this review, evaluation methods for morphological changes in the epidermal nerves of skin, and the intrinsic nerves of the stomach will be discussed.

  2. Autonomous Cargo Transport System for an Unmanned Aerial Vehicle, using Visual Servoing

    Directory of Open Access Journals (Sweden)

    Noah Kuntz

    2009-12-01

    Full Text Available This paper presents the design and testing of a system for autonomous tracking, pickup, and delivery of cargo via an unmanned helicopter. The tracking system uses a visual servoing algorithm and is tested using open loop velocity control of a six degree of freedom gantry system with a camera mounted via a pan-tilt unit on the end effecter. The pickup system uses vision to direct the camera pan tilt unit to track the target, and uses a hook attached to a second pan tilt unit to pick up the cargo. The ability of the pickup system to hook a target is tested by mounting it on the Systems Integrated Sensor Test Rig gantry system while recorded helicopter velocities are played back by the test rig.

  3. Packaging and transportation of radioactive materials

    International Nuclear Information System (INIS)

    1978-01-01

    The following topics are discussed in this volume: shielding and criticality; transportation accidents; physical security in transit; transport forecasting and logistics; transportation experience, operations and planning; regulation; standards and quality assurance; risk analysis; and environmental impacts. Separate abstracts are prepared for individual items

  4. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...... on a complete model representation of the individual components of the system; three different types of conventional generators are included in the model, while the protection system is also incorporated. The load shedding following faults is finally discussed....

  5. A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

    Directory of Open Access Journals (Sweden)

    Zhonglin Chen

    2018-01-01

    Full Text Available The ultradense network (UDN is one of the most promising technologies in the fifth generation (5G to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC scheme; the scheme solves the security problem among the access points (APs in a dynamic APs group (APG and between the AP and user equipment (UE. We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.

  6. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  7. Autonomous Operations System: Development and Application

    Science.gov (United States)

    Toro Medina, Jaime A.; Wilkins, Kim N.; Walker, Mark; Stahl, Gerald M.

    2016-01-01

    Autonomous control systems provides the ability of self-governance beyond the conventional control system. As the complexity of mechanical and electrical systems increases, there develops a natural drive for developing robust control systems to manage complicated operations. By closing the bridge between conventional automated systems to knowledge based self-awareness systems, nominal control of operations can evolve into relying on safe critical mitigation processes to support any off-nominal behavior. Current research and development efforts lead by the Autonomous Propellant Loading (APL) group at NASA Kennedy Space Center aims to improve cryogenic propellant transfer operations by developing an automated control and health monitoring system. As an integrated systems, the center aims to produce an Autonomous Operations System (AOS) capable of integrating health management operations with automated control to produce a fully autonomous system.

  8. ROV90 - A prototype autonomous inspection vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Roedseth, Oe.J.; Hallset, J.O.

    1991-04-01

    Simple autonomous inspection vehicles are suitable for operations where the cost, danger to humans, or area of operation prohibits the use of conventional underwater technology. Autonomous vehicles are, however, in their infancy and few such vehicles are available. There are still some problems to be overcome before this technology becomes useful in commercial applications. We have built ROV90 to investigate these problems. It is a test bed for experimenting with the different parts of an autonomous underwater vehicle. ROV90 will be able to autonomously follow prominent features in the real world, man made or natural. Examples are pipelines or walls in tunnels. ROV90 is tethered, but we are planning to use experience and results from ROV90 to develop av ''real'' autonomous underwater vehicle (AUV) called PISCIS. 11 refs., 8 figs.

  9. Autonomous Cryogenic Load Operations: KSC Autonomous Test Engineer

    Science.gov (United States)

    Shrading, Nicholas J.

    2012-01-01

    The KSC Autonomous Test Engineer (KATE) program has a long history at KSC. Now a part of the Autonomous Cryogenic Load Operations (ACLO) mission, this software system has been sporadically developed over the past 20+ years. Originally designed to provide health and status monitoring for a simple water-based fluid system, it was proven to be a capable autonomous test engineer for determining sources of failure in. the system, As part.of a new goal to provide this same anomaly-detection capability for a complicated cryogenic fluid system, software engineers, physicists, interns and KATE experts are working to upgrade the software capabilities and graphical user interface. Much progress was made during this effort to improve KATE. A display ofthe entire cryogenic system's graph, with nodes for components and edges for their connections, was added to the KATE software. A searching functionality was added to the new graph display, so that users could easily center their screen on specific components. The GUI was also modified so that it displayed information relevant to the new project goals. In addition, work began on adding new pneumatic and electronic subsystems into the KATE knowledgebase, so that it could provide health and status monitoring for those systems. Finally, many fixes for bugs, memory leaks, and memory errors were implemented and the system was moved into a state in which it could be presented to stakeholders. Overall, the KATE system was improved and necessary additional features were added so that a presentation of the program and its functionality in the next few months would be a success.

  10. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  11. Packaging and transportation of radioactive materials

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-01-01

    The following topics are discussed in this volume: shielding and criticality; transportation accidents; physical security in transit; transport forecasting and logistics; transportation experience, operations and planning; regulation; standards and quality assurance; risk analysis; and environmental impacts. Separate abstracts are prepared for individual items. (DC)

  12. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  13. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  14. TOWARDS A NEW ARCHITECTURE FOR AUTONOMOUS DATA COLLECTION

    Directory of Open Access Journals (Sweden)

    T. J. Tanzi

    2015-08-01

    Full Text Available A new generation of UAVs is coming that will help improve the situational awareness and assessment necessary to ensure quality data collection, especially in difficult conditions like natural disasters. Operators should be relieved from time-consuming data collection tasks as much as possible and at the same time, UAVs should assist data collection operations through a more insightful and automated guidance thanks to advanced sensing capabilities. In order to achieve this vision, two challenges must be addressed though. The first one is to achieve a sufficient autonomy, both in terms of navigation and of interpretation of the data sensed. The second one relates to the reliability of the UAV with respect to accidental (safety or even malicious (security risks. This however requires the design and development of new embedded architectures for drones to be more autonomous, while mitigating the harm they may potentially cause. We claim that the increased complexity and flexibility of such platforms requires resorting to modelling, simulation, or formal verification techniques in order to validate such critical aspects of the platform. This paper first discusses the potential and challenges faced by autonomous UAVs for data acquisition. The design of a flexible and adaptable embedded UAV architecture is then addressed. Finally, the need for validating the properties of the platform is discussed. Our approach is sketched and illustrated with the example of a lightweight drone performing 3D reconstructions out of the combination of 2D image acquisition and a specific motion control.

  15. Autonomous power networks based power system

    International Nuclear Information System (INIS)

    Jokic, A.; Van den Bosch, P.P.J.

    2006-01-01

    This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs

  16. Advancing Autonomous Operations for Deep Space Vehicles

    Science.gov (United States)

    Haddock, Angie T.; Stetson, Howard K.

    2014-01-01

    Starting in Jan 2012, the Advanced Exploration Systems (AES) Autonomous Mission Operations (AMO) Project began to investigate the ability to create and execute "single button" crew initiated autonomous activities [1]. NASA Marshall Space Flight Center (MSFC) designed and built a fluid transfer hardware test-bed to use as a sub-system target for the investigations of intelligent procedures that would command and control a fluid transfer test-bed, would perform self-monitoring during fluid transfers, detect anomalies and faults, isolate the fault and recover the procedures function that was being executed, all without operator intervention. In addition to the development of intelligent procedures, the team is also exploring various methods for autonomous activity execution where a planned timeline of activities are executed autonomously and also the initial analysis of crew procedure development. This paper will detail the development of intelligent procedures for the NASA MSFC Autonomous Fluid Transfer System (AFTS) as well as the autonomous plan execution capabilities being investigated. Manned deep space missions, with extreme communication delays with Earth based assets, presents significant challenges for what the on-board procedure content will encompass as well as the planned execution of the procedures.

  17. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

    OpenAIRE

    Lei, Ao; Cruickshank, Haitham; Cao, Y; Asuquo, Philip; Anyigor Ogah, Chibueze Pascal; Sun, Zhili

    2017-01-01

    As modern vehicle and communication technologies advanced apace, people begin to believe that Intelligent Transportation System (ITS) would be achievable in one decade.\\ud ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in Vehicular Communication Systems (VCS). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considere...

  18. Autonomous Science Analysis with the New Millennium Program-Autonomous Sciencecraft Experiment

    Science.gov (United States)

    Doggett, T.; Davies, A. G.; Castano, R. A.; Baker, V. R.; Dohm, J. M.; Greeley, R.; Williams, K. K.; Chien, S.; Sherwood, R.

    2002-12-01

    The NASA New Millennium Program (NMP) is a testbed for new, high-risk technologies, including new software and hardware. The Autonomous Sciencecraft Experiment (ASE) will fly on the Air Force Research Laboratory TechSat-21 mission in 2006 is such a NMP mission, and is managed by the Jet Propulsion Laboratory, California Institute of Technology. TechSat-21 consists of three satellites, each equipped with X-band Synthetic Aperture Radar (SAR) that will occupy a 13-day repeat track Earth orbit. The main science objectives of ASE are to demonstrate that process-related change detection and feature identification can be conducted autonomously during space flight, leading to autonomous onboard retargeting of the spacecraft. This mission will observe transient geological and environmental processes using SAR. Examples of geologic processes that may be observed and investigated include active volcanism, the movement of sand dunes and transient features in desert environments, water flooding, and the formation and break-up of lake ice. Science software onboard the spacecraft will allow autonomous processing and formation of SAR images and extraction of scientific information. The subsequent analyses, performed on images formed onboard from the SAR data, will include feature identification using scalable feature "templates" for each target, change detection through comparison of current and archived images, and science discovery, a search for other features of interest in each image. This approach results in obtaining the same science return for a reduced amount of resource use (such as downlink) when compared to that from a mission operating without ASE technology. Redundant data is discarded. The science-driven goals of ASE will evolve during the ASE mission through onboard replanning software that can re-task satellite operations. If necessary, as a result of a discovery made autonomously by onboard science processing, existing observation sequences will be pre-empted to

  19. China's energy security: Perception and reality

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Guy C.K., E-mail: guyleung@gmail.co [Hong Kong Energy Studies Centre, Hong Kong Baptist University, Kowloon Tong, Hong Kong Special Administrative Region (Hong Kong)

    2011-03-15

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: {yields} Oil is the form of energy that has produced most of China's energy insecurity. {yields} Transport sector, rather than industry, is the largest driver of China's oil demand. {yields} The contribution of oil pipelines to China's energy security is smaller than many assumed. {yields} Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. {yields} Energy security is a means; it is not a goal.

  20. Autonomous search

    CERN Document Server

    Hamadi, Youssef; Saubion, Frédéric

    2012-01-01

    Autonomous combinatorial search (AS) represents a new field in combinatorial problem solving. Its major standpoint and originality is that it considers that problem solvers must be capable of self-improvement operations. This is the first book dedicated to AS.

  1. Approach for Autonomous Control of Unmanned Aerial Vehicle Using Intelligent Agents for Knowledge Creation

    Science.gov (United States)

    Dufrene, Warren R., Jr.

    2004-01-01

    This paper describes the development of a planned approach for Autonomous operation of an Unmanned Aerial Vehicle (UAV). A Hybrid approach will seek to provide Knowledge Generation thru the application of Artificial Intelligence (AI) and Intelligent Agents (IA) for UAV control. The application of many different types of AI techniques for flight will be explored during this research effort. The research concentration will be directed to the application of different AI methods within the UAV arena. By evaluating AI approaches, which will include Expert Systems, Neural Networks, Intelligent Agents, Fuzzy Logic, and Complex Adaptive Systems, a new insight may be gained into the benefits of AI techniques applied to achieving true autonomous operation of these systems thus providing new intellectual merit to this research field. The major area of discussion will be limited to the UAV. The systems of interest include small aircraft, insects, and miniature aircraft. Although flight systems will be explored, the benefits should apply to many Unmanned Vehicles such as: Rovers, Ocean Explorers, Robots, and autonomous operation systems. The flight system will be broken down into control agents that will represent the intelligent agent approach used in AI. After the completion of a successful approach, a framework of applying a Security Overseer will be added in an attempt to address errors, emergencies, failures, damage, or over dynamic environment. The chosen control problem was the landing phase of UAV operation. The initial results from simulation in FlightGear are presented.

  2. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  3. Energy homeostasis, autonomic activity and obesity

    NARCIS (Netherlands)

    Scheurink, AJW; Balkan, B; Nyakas, C; vanDijk, G; Steffens, AB; Bohus, B

    1995-01-01

    Obesity is often accompanied by alterations in both sympathetic and parasympathetic autonomic functions. The present paper summarizes the results of a number of studies designed to investigate autonomic functioning in normal, genetically, and experimentally obese rats, Particular emphasis is given

  4. The effects of long-term microgravity on autonomic regulation of blood circulation in crewmembers of the international space station

    Directory of Open Access Journals (Sweden)

    Roman М. Baevsky

    2014-11-01

    Full Text Available The article presents the results of space experiment “Pneumocard”. The investigation involved all 25 Russian members of the ISS crew. The total of 226 sessions were made including 130 aboard the ISS, 50 prior to launch and 46 on return from mission. The objective was to study effects of the spaceflight factors on autonomic regulation of blood circulation, respiration and cardiac contractility during long-duration mission. The purpose was to secure new research data that would clarify our present view of adaptation mechanisms. Registered were the following signals: electrocardiogram, impedance cardiogram, seismic cardiogram, pneumotachogram, finger photoplethysmogram. A set of hard- and software was used. Autonomic regulation of blood circulation by HRV analysis was investigated. It was shown that at the onset of a space mission parasympathetic involvement in regulation increases typically with subsequent mobilization of additional functional reserve. It guided the development of a functional states mathematical model incorporating the established types of autonomic regulation. Our data evidence that the combination of HRV analysis, pre-nosology diagnosis and probabilistic estimate of the pathology risk can reinforce the medical care program in space missions.

  5. Autonomous Micro-Air-Vehicle Control Based on Visual Sensing for Odor Source Localization

    Directory of Open Access Journals (Sweden)

    Kenzo Kurotsuchi

    2017-07-01

    Full Text Available In this paper, we propose a novel control method for autonomous-odor-source localization using visual and odor sensing by micro air vehicles (MAVs. Our method is based on biomimetics, which enable highly autonomous localization. Our method does not need any instruction signals, including even global positioning system (GPS signals. An experimenter simply blows a whistle, and the MAV will then start to hover, to seek an odor source, and to keep hovering near the source. The GPS-signal-free control based on visual sense enables indoor/underground use. Moreover, the MAV is light-weight (85 grams and does not cause harm to others even if it accidentally falls. Experiments conducted in the real world were successful in enabling odor source localization using the MAV with a bio-inspired searching method. The distance error of the localization was 63 cm, more accurate than the target distance of 120 cm for individual identification. Our odor source localization is the first step to a proof of concept for a danger warning system. These localization experiments were the first step to a proof of concept for a danger warning system to enable a safer and more secure society.

  6. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  7. A simulation approach for analysis of short-term security of natural gas supply in Colombia

    International Nuclear Information System (INIS)

    Villada, Juan; Olaya, Yris

    2013-01-01

    Achieving security of gas supply implies diversifying gas sources, while having enough supply, transportation, and storage capacity to meet demand peaks and supply interruptions. Devising a strategy for securing gas supply is not straightforward because gas supply depends on complex interactions of production, demand and infrastructure, and it is exposed to economic, regulatory, political, environmental and technical risks. To address this complexity, we propose a simulation approach that replicates the structure of the gas supply chain, including transportation constraints and demand fluctuations. We build and calibrate a computer model for the Colombian gas sector, and run the model to assess the impact of expanding transportation capacity and increasing market flexibility on the security of supply. Our analysis focuses on the operation and planned and proposed expansions of the transportation infrastructure because adequate regulation and development of this infrastructure can contribute to increase the security of supply in the gas sector. We find that proposed import facilities, specifically LNG import terminals at Buenaventura, increase system's security under the current market structure. - Highlights: ► We build a simulation model for analyzing natural gas trade in Colombia. ► The model captures the structure of the gas network and on market rules. ► We simulate investment decisions to increase short-term security of supply. ► Securing supply would need LNG imports and expansion of pipeline capacity.

  8. Biofuels for sustainable transportation

    Energy Technology Data Exchange (ETDEWEB)

    Neufeld, S.

    2000-05-23

    Biomass is an attractive energy source, and transportation fuels made from biomass offer a number of benefits. Developing the technology to produce and use biofuels will create transportation fuel options that can positively impact the national energy security, the economy, and the environment. Biofuels include ethanol, methanol, biodiesel, biocrude, and methane.

  9. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  10. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  11. Research Institute for Autonomous Precision Guided Systems

    National Research Council Canada - National Science Library

    Rogacki, John R

    2007-01-01

    ... vehicles, cooperative flight of autonomous aerial vehicles using GPS and vision information, cooperative and sharing of information in search missions involving multiple autonomous agents, multi-scale...

  12. Transport of MOX fuel

    International Nuclear Information System (INIS)

    Porter, I.R.; Carr, M.

    1997-01-01

    The regulatory framework which governs the transport of MOX fuel is set out, including packages, transport modes and security requirements. Technical requirements for the packages are reviewed and BNFL's experience in plutonium and MOX fuel transport is described. The safety of such operations and the public perception of safety are described and the question of gaining public acceptance for MOX fuel transport is addressed. The paper concludes by emphasising the need for proactive programmes to improve the public acceptance of these operations. (Author)

  13. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  14. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    Energy Technology Data Exchange (ETDEWEB)

    Shue, Craig A [ORNL; Kalafut, Prof. Andrew [Grand Valley State University (GVSU), Michigan; Gupta, Prof. Minaxi [Indiana University

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  15. Adaptive Control Allocation for Fault Tolerant Overactuated Autonomous Vehicles

    Science.gov (United States)

    2007-11-01

    Tolerant Overactuated Autonomous Vehicles Casavola, A.; Garone, E. (2007) Adaptive Control Allocation for Fault Tolerant Overactuated Autonomous ...Adaptive Control Allocation for Fault Tolerant Overactuated Autonomous Vehicles 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...Tolerant Overactuated Autonomous Vehicles 3.2 - 2 RTO-MP-AVT-145 UNCLASSIFIED/UNLIMITED Control allocation problem (CAP) - Given a virtual input v(t

  16. 46 CFR 148.03-7 - During transport.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false During transport. 148.03-7 Section 148.03-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES CARRIAGE OF SOLID HAZARDOUS MATERIALS IN BULK Minimum Transportation Requirements § 148.03-7 During transport. During the transport of a...

  17. Overfeeding, autonomic regulation and metabolic consequences.

    NARCIS (Netherlands)

    Scheurink, A.J.W.; Balkan, B; Strubbe, J.H.; van Dijk, G.; Steffens, A.B

    The autonomic nervous system plays an important role in the regulation of body processes in health and disease. Overfeeding and obesity (a disproportional increase of the fat mass of the body) are often accompanied by alterations in both sympathetic and parasympathetic autonomic functions. The

  18. 46 CFR 308.507 - Security for payment of premiums.

    Science.gov (United States)

    2010-10-01

    ....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...

  19. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  20. The development of mobile robot for security application and nuclear facilities

    International Nuclear Information System (INIS)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  1. Autonomic dysfunction in different subtypes of multiple system atrophy.

    Science.gov (United States)

    Schmidt, Claudia; Herting, Birgit; Prieur, Silke; Junghanns, Susann; Schweitzer, Katherine; Globas, Christoph; Schöls, Ludger; Reichmann, Heinz; Berg, Daniela; Ziemssen, Tjalf

    2008-09-15

    Multiple system atrophy (MSA) can clinically be divided into the cerebellar (MSA-C) and the parkinsonian (MSA-P) variant. However, till now, it is unknown whether autonomic dysfunction in these two entities differs regarding severity and profile. We compared the pattern of autonomic dysfunction in 12 patients with MSA-C and 26 with MSA-P in comparison with 27 age- and sex-matched healthy controls using a standard battery of autonomic function tests and a structured anamnesis of the autonomic nervous system. MSA-P patients complained significantly more often about the symptoms of autonomic dysfunctions than MSA-C patients, especially regarding vasomotor, secretomotor, and gastrointestinal subsystems. However, regarding cardiovascular, sudomotor pupil, urogenital, and sleep subsystems, there were no significant quantitative or qualitative differences as analyzed by autonomic anamnesis and testing. Our results suggest that there are only minor differences in the pattern of autonomic dysfunction between the two clinical MSA phenotypes. (c) 2007 Movement Disorder Society.

  2. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  3. Design of a robotic automation system for transportation of goods in hospitals

    DEFF Research Database (Denmark)

    Özkil, Ali Gürcan; Sørensen, Torben; Fan, Zhun

    2007-01-01

    Hospitals face with heavy traffic of goods everyday, where transportation tasks are mainly carried by human. Analysis of the current situation of transportation in a typical hospital showed several transportation tasks are suitable for automation. This paper presents a system, consisting of a fleet...... of robot vehicles, automatic stations and smart containers for automation of transportation of goods in hospitals. Design of semi-autonomous robot vehicles, containers and stations are presented and the overall system architecture is described. Implementing such a system in an existing hospital showed...

  4. The Bering Autonomous Target Detection

    DEFF Research Database (Denmark)

    Jørgensen, John Leif; Denver, Troelz; Betto, Maurizio

    2003-01-01

    An autonomous asteroid target detection and tracking method has been developed. The method features near omnidirectionality and focus on high speed operations and completeness of search of the near space rather than the traditional faint object search methods, employed presently at the larger...... telescopes. The method has proven robust in operation and is well suited for use onboard spacecraft. As development target for the method and the associated instrumentation the asteroid research mission Bering has been used. Onboard a spacecraft, the autonomous detection is centered around the fully...... autonomous star tracker the Advanced Stellar Compass (ASC). One feature of this instrument is that potential targets are registered directly in terms of date, right ascension, declination, and intensity, which greatly facilitates both tracking search and registering. Results from ground and inflight tests...

  5. An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    Directory of Open Access Journals (Sweden)

    Mansik Kim

    2017-08-01

    Full Text Available As the Internet of Things (IoT has developed, the emerging sensor network (ESN that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future.

  6. Efficacy of atomoxetine versus midodrine for the treatment of orthostatic hypotension in autonomic failure.

    Science.gov (United States)

    Ramirez, Claudia E; Okamoto, Luis E; Arnold, Amy C; Gamboa, Alfredo; Diedrich, André; Choi, Leena; Raj, Satish R; Robertson, David; Biaggioni, Italo; Shibao, Cyndya A

    2014-12-01

    The clinical presentation of autonomic failure is orthostatic hypotension. Severely affected patients require pharmacological treatment to prevent presyncopal symptoms or frank syncope. We previously reported in a proof of concept study that pediatric doses of the norepinephrine transporter blockade, atomoxetine, increases blood pressure in autonomic failure patients with residual sympathetic activity compared with placebo. Given that the sympathetic nervous system is maximally activated in the upright position, we hypothesized that atomoxetine would be superior to midodrine, a direct vasoconstrictor, in improving upright blood pressure and orthostatic hypotension-related symptoms. To test this hypothesis, we compared the effect of acute atomoxetine versus midodrine on upright systolic blood pressure and orthostatic symptom scores in 65 patients with severe autonomic failure. There were no differences in seated systolic blood pressure (means difference=0.3 mm Hg; 95% confidence [CI], -7.3 to 7.9; P=0.94). In contrast, atomoxetine produced a greater pressor response in upright systolic blood pressure (means difference=7.5 mm Hg; 95% CI, 0.6 to 15; P=0.03) compared with midodrine. Furthermore, atomoxetine (means difference=0.4; 95% CI, 0.1 to 0.8; P=0.02), but not midodrine (means difference=0.5; 95% CI, -0.1 to 1.0; P=0.08), improved orthostatic hypotension-related symptoms as compared with placebo. The results of our study suggest that atomoxetine could be a superior therapeutic option than midodrine for the treatment of orthostatic hypotension in autonomic failure. © 2014 American Heart Association, Inc.

  7. Autonomic Dysfunction in Patients with Mild to Moderate Alzheimer's Disease

    DEFF Research Database (Denmark)

    Jensen-Dahm, Christina; Waldemar, Gunhild; Staehelin Jensen, Troels

    2015-01-01

    BACKGROUND: Autonomic function has received little attention in Alzheimer's disease (AD). AD pathology has an impact on brain regions which are important for central autonomic control, but it is unclear if AD is associated with disturbance of autonomic function. OBJECTIVE: To investigate autonomic...

  8. Functional Imaging of Autonomic Regulation: Methods and Key Findings

    Directory of Open Access Journals (Sweden)

    Paul M Macey

    2016-01-01

    Full Text Available Central nervous system processing of autonomic function involves a network of regions throughout the brain which can be visualized and measured with neuroimaging techniques, notably functional magnetic resonance imaging (fMRI. The development of fMRI procedures has both confirmed and extended earlier findings from animal models, and human stroke and lesion studies. Assessments with fMRI can elucidate interactions between different central sites in regulating normal autonomic patterning, and demonstrate how disturbed systems can interact to produce aberrant regulation during autonomic challenges. Understanding autonomic dysfunction in various illnesses reveals mechanisms that potentially lead to interventions in the impairments. The objectives here are to: 1 describe the fMRI neuroimaging methodology for assessment of autonomic neural control, 2 outline the widespread, lateralized distribution of function in autonomic sites in the normal brain which includes structures from the neocortex through the medulla and cerebellum, 3 illustrate the importance of the time course of neural changes when coordinating responses, and how those patterns are impacted in conditions of sleep-disordered breathing, and 4 highlight opportunities for future research studies with emerging methodologies. Methodological considerations specific to autonomic testing include timing of challenges relative to the underlying fMRI signal, spatial resolution sufficient to identify autonomic brainstem nuclei, blood pressure and blood oxygenation influences on the fMRI signal, and the sustained timing, often measured in minutes of challenge periods and recovery. Key findings include the lateralized nature of autonomic organization, which is reminiscent of asymmetric motor, sensory and language pathways. Testing brain function during autonomic challenges demonstrate closely-integrated timing of responses in connected brain areas during autonomic challenges, and the involvement with

  9. Advanced Autonomous Systems for Space Operations

    Science.gov (United States)

    Gross, A. R.; Smith, B. D.; Muscettola, N.; Barrett, A.; Mjolssness, E.; Clancy, D. J.

    2002-01-01

    New missions of exploration and space operations will require unprecedented levels of autonomy to successfully accomplish their objectives. Inherently high levels of complexity, cost, and communication distances will preclude the degree of human involvement common to current and previous space flight missions. With exponentially increasing capabilities of computer hardware and software, including networks and communication systems, a new balance of work is being developed between humans and machines. This new balance holds the promise of not only meeting the greatly increased space exploration requirements, but simultaneously dramatically reducing the design, development, test, and operating costs. New information technologies, which take advantage of knowledge-based software, model-based reasoning, and high performance computer systems, will enable the development of a new generation of design and development tools, schedulers, and vehicle and system health management capabilities. Such tools will provide a degree of machine intelligence and associated autonomy that has previously been unavailable. These capabilities are critical to the future of advanced space operations, since the science and operational requirements specified by such missions, as well as the budgetary constraints will limit the current practice of monitoring and controlling missions by a standing army of ground-based controllers. System autonomy capabilities have made great strides in recent years, for both ground and space flight applications. Autonomous systems have flown on advanced spacecraft, providing new levels of spacecraft capability and mission safety. Such on-board systems operate by utilizing model-based reasoning that provides the capability to work from high-level mission goals, while deriving the detailed system commands internally, rather than having to have such commands transmitted from Earth. This enables missions of such complexity and communication` distances as are not

  10. A Primer on Autonomous Aerial Vehicle Design.

    Science.gov (United States)

    Coppejans, Hugo H G; Myburgh, Herman C

    2015-12-02

    There is a large amount of research currently being done on autonomous micro-aerial vehicles (MAV), such as quadrotor helicopters or quadcopters. The ability to create a working autonomous MAV depends mainly on integrating a simultaneous localization and mapping (SLAM) solution with the rest of the system. This paper provides an introduction for creating an autonomous MAV for enclosed environments, aimed at students and professionals alike. The standard autonomous system and MAV automation are discussed, while we focus on the core concepts of SLAM systems and trajectory planning algorithms. The advantages and disadvantages of using remote processing are evaluated, and recommendations are made regarding the viability of on-board processing. Recommendations are made regarding best practices to serve as a guideline for aspirant MAV designers.

  11. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  12. Enabling technologies for the prassi autonomous robot

    Energy Technology Data Exchange (ETDEWEB)

    Taraglio, S.; Nanni, V. [ENEA, Robotics and Information Technology Division, Rome (Italy)

    2001-07-01

    In this book are summarised some of the results of the PRASSI project as presented by the different partners of the effort. PRASSI is an acronym which stands for Autonomous Robotic Platform for the Security and Surveillance of plants, the Italian for it is 'Piattaforma Robotica per la Sorveglianza e Sicurezza d'Impianto'. This project has been funded by the Italian Ministry for the Education, the University and the Research (MIUR) in the framework of the project High Performance Computing Applied to Robotics (Calcolo Parallelo con Applicazioni alla Robotica) of the law 95/1995. The idea behind such an initiative is that of fostering the knowledge and possibly the use of high performance computing in the research and industrial community. In other words, robotic scientists are always simplifying their algorithms or using particular approaches (e.g. soft computing) in order to use standard processors for difficult sensorial data processing; well, what if an embedded parallel computer were available, with at least one magnitude more of computing power?.

  13. Radioactive material air transportation

    International Nuclear Information System (INIS)

    Pader y Terry, Claudio Cosme

    2002-01-01

    As function of the high aggregated value, safety regulations and the useful life time, the air transportation has been used more regularly because is fast, reliable, and by giving great security to the cargo. Based on the International Atomic Energy Agency (IAEA), the IATA (International Air Transportation Association) has reproduced in his dangerous goods manual (Dangerous Goods Regulations - DGR IATA), the regulation for the radioactive material air transportation. Those documents support this presentation

  14. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  15. Security assessment in harbours: parameters to be considered

    Energy Technology Data Exchange (ETDEWEB)

    Romero Faz, D.; Camarero Orive, A.

    2016-07-01

    The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces. (Author)

  16. Exact Solutions for Certain Nonlinear Autonomous Ordinary Differential Equations of the Second Order and Families of Two-Dimensional Autonomous Systems

    Directory of Open Access Journals (Sweden)

    M. P. Markakis

    2010-01-01

    Full Text Available Certain nonlinear autonomous ordinary differential equations of the second order are reduced to Abel equations of the first kind ((Ab-1 equations. Based on the results of a previous work, concerning a closed-form solution of a general (Ab-1 equation, and introducing an arbitrary function, exact one-parameter families of solutions are derived for the original autonomous equations, for the most of which only first integrals (in closed or parametric form have been obtained so far. Two-dimensional autonomous systems of differential equations of the first order, equivalent to the considered herein autonomous forms, are constructed and solved by means of the developed analysis.

  17. May a unitary autonomic index help assess autonomic cardiac regulation in elite athletes? Preliminary observations on the national Italian Olympic committee team.

    Science.gov (United States)

    Sala, Roberto; Malacarne, Mara; Tosi, Fabio; Benzi, Manuela; Solaro, Nadia; Tamorri, Stefano; Spataro, Antonio; Pagani, Massimo; Lucini, Daniela

    2017-12-01

    Long term endurance training, as occurring in elite athletes, is associated to cardiac neural remodeling in favor of cardioprotective vagal mechanisms, resulting in resting bradycardia and augmented contribution of cardiac parasympathetic nerve activity. Autonomic assessment can be performed by way of heart rate variability. This technique however provides multiple indices, and there is not yet complete agreement on their specific significance. Purpose of the study was to assess whether a rank transformation and radar plot could provide a unitary autonomic index, capable to show a correlation between intensity of individual work and quality of autonomic regulation. We studied 711 (23.6±6.2 years) elite athletes that took part in the selection procedure for the 2016 Rio Olympic Games for the National Italian Olympic Committee (CONI). Indices from Heart Rate Variability HRV obtained at rest, during standing up and during recovery from an exercise test were used to compute a percent ranked unitary autonomic index for sport (ANSIs), taken as proxy of quality of autonomic regulation. Within the observed wide range of energy expenditure, the unitary autonomic index ANSIs appears significantly correlated to individual and discipline specific training workloads (r=0.25, P<0.001 and r=0.78, P<0.001, respectively), correcting for possible age and gender bias. ANSIs also positively correlates to lipid profile. Estimated intensity of physical activity correlates with quality of cardiac autonomic regulation, as expressed by a novel unitary index of cardiac autonomic regulation. ANSIs could provide a novel and convenient approach to individual autonomic evaluation in athletes.

  18. Dans quelle mesure la mise en place des navettes autonomes dans les zones périphériques de Genève pourrait remplacer l’utilisation des véhicules privés ?

    OpenAIRE

    Safarov, Tim; Konstantas, Dimitri

    2017-01-01

    Ce travail est basé sur un avant-projet nommé « AVENUE » (Autonomous Vehicles to Evolve to a New Urban Experience) proposé à la Commission européenne des transports et de mobilité. Il s’agit d’un projet qui a pour but de démonter l’utilité que pourraient avoir les véhicules autonomes dans le cadre des transports publics et de mettre en lumière les divers avantages pratiques, économiques, environnementaux et sociaux qu’ils pourraient procurer. Le travail suivant tente avant tout d’explorer l’é...

  19. PHM Enabled Autonomous Propellant Loading Operations

    Science.gov (United States)

    Walker, Mark; Figueroa, Fernando

    2017-01-01

    The utility of Prognostics and Health Management (PHM) software capability applied to Autonomous Operations (AO) remains an active research area within aerospace applications. The ability to gain insight into which assets and subsystems are functioning properly, along with the derivation of confident predictions concerning future ability, reliability, and availability, are important enablers for making sound mission planning decisions. When coupled with software that fully supports mission planning and execution, an integrated solution can be developed that leverages state assessment and estimation for the purposes of delivering autonomous operations. The authors have been applying this integrated, model-based approach to the autonomous loading of cryogenic spacecraft propellants at Kennedy Space Center.

  20. Autonomous Control of Space Reactor Systems

    International Nuclear Information System (INIS)

    Belle R. Upadhyaya; K. Zhao; S.R.P. Perillo; Xiaojia Xu; M.G. Na

    2007-01-01

    Autonomous and semi-autonomous control is a key element of space reactor design in order to meet the mission requirements of safety, reliability, survivability, and life expectancy. Interrestrial nuclear power plants, human operators are available to perform intelligent control functions that are necessary for both normal and abnormal operational conditions

  1. Autonomous Control of Space Reactor Systems

    Energy Technology Data Exchange (ETDEWEB)

    Belle R. Upadhyaya; K. Zhao; S.R.P. Perillo; Xiaojia Xu; M.G. Na

    2007-11-30

    Autonomous and semi-autonomous control is a key element of space reactor design in order to meet the mission requirements of safety, reliability, survivability, and life expectancy. Interrestrial nuclear power plants, human operators are avilable to perform intelligent control functions that are necessary for both normal and abnormal operational conditions.

  2. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  3. The treatment of autonomic dysfunction in tetanus

    Directory of Open Access Journals (Sweden)

    T van den Heever

    2017-07-01

    Full Text Available We report a case of generalised tetanus in a 50-year-old female patient after sustaining a wound to her right lower leg. She developed autonomic dysfunction, which included labile hypertension alternating with hypotension and sweating. The autonomic dysfunction was treated successfully with a combination of morphine sulphate infusion, magnesium sulphate, and clonidine. She also received adrenaline and phenylephrine infusions as needed for hypotension. We then discuss the pathophysiology, clinical features and treatment options of autonomic dysfunction.

  4. Swarm autonomic agents with self-destruct capability

    Science.gov (United States)

    Hinchey, Michael G. (Inventor); Sterritt, Roy (Inventor)

    2011-01-01

    Systems, methods and apparatus are provided through which in some embodiments an autonomic entity manages a system by generating one or more stay alive signals based on the functioning status and operating state of the system. In some embodiments, an evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy. The evolvable neural interface receives and generates heartbeat monitor signals and pulse monitor signals that are used to generate a stay alive signal that is used to manage the operations of the synthetic neural system. In another embodiment an asynchronous Alice signal (Autonomic license) requiring valid credentials of an anonymous autonomous agent is initiated. An unsatisfactory Alice exchange may lead to self-destruction of the anonymous autonomous agent for self-protection.

  5. A Primer on Autonomous Aerial Vehicle Design

    Directory of Open Access Journals (Sweden)

    Hugo H. G. Coppejans

    2015-12-01

    Full Text Available There is a large amount of research currently being done on autonomous micro-aerial vehicles (MAV, such as quadrotor helicopters or quadcopters. The ability to create a working autonomous MAV depends mainly on integrating a simultaneous localization and mapping (SLAM solution with the rest of the system. This paper provides an introduction for creating an autonomous MAV for enclosed environments, aimed at students and professionals alike. The standard autonomous system and MAV automation are discussed, while we focus on the core concepts of SLAM systems and trajectory planning algorithms. The advantages and disadvantages of using remote processing are evaluated, and recommendations are made regarding the viability of on-board processing. Recommendations are made regarding best practices to serve as a guideline for aspirant MAV designers.

  6. F-18-FDG-PET in autonomous goiter

    International Nuclear Information System (INIS)

    Boerner, A.R.; Voth, E.; Schicha, H.

    1999-01-01

    Aim: Gain-of-function mutations of the thyrotropin receptor (TSHR) gene have been invoked as one of the major causes of toxic thyroid adenomas. This study evaluates F-18-FDG-PET in these patients. Methods: Twenty patients with focal autonomous nodules and ten with disseminated autonomy were investigated the day before radioiodine therapy. Twenty patients with cancer of the head or neck and normal thyroid function served as controls. Results: F-18-FDG-Uptake was higher in patients than in controls. Focal autonomous nodules were associated with focally enhanced glucose metabolism. Disseminated autonomous goiters showed various patterns of focal or global hypermetabolism. Conclusion: Autonomous thyroid tissue caused by constitutive mutations of the TSH receptor is characterised by simultaneous increases in glucose and iodine metabolism which are correlated. (orig.) [de

  7. The analysis of a novel 3-D autonomous system and circuit implementation

    International Nuclear Information System (INIS)

    Dong Gaogao; Zheng Song; Tian Lixin; Du Ruijin; Sun Mei; Shi Zhiyan

    2009-01-01

    This Letter presents a new three-dimensional autonomous system with four quadratic terms. The system with five equilibrium points has complex chaotic dynamics behaviors. It can generate many different single chaotic attractors and double coexisting chaotic attractors over a large range of parameters. We observe that these chaotic attractors were rarely reported in previous work. The complex dynamical behaviors of the system are further investigated by means of phase portraits, Lyapunov exponents spectrum, Lyapunov dimension, dissipativeness of system, bifurcation diagram and Poincare map. The physical circuit experimental results of the chaotic attractors show agreement with numerical simulations. More importantly, the analysis of frequency spectrum shows that the novel system has a broad frequency bandwidth, which is very desirable for engineering applications such as secure communications.

  8. Cyber Safety and Security for Reduced Crew Operations (RCO)

    Science.gov (United States)

    Driscoll, Kevin

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.

  9. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  10. Improved Collaborative Transport Planning at Dutch Logistics Service Provider Fritom

    NARCIS (Netherlands)

    Buijs, Paul; Lopez Alvarez, Jose Alejandro; Veenstra, Marjolein; Roodbergen, Kees Jan

    2016-01-01

    We study the collaborative transport planning for two autonomous business units of Fritom, a Dutch logistics service provider. This difficult planning problem does not fit any existing type of vehicle routing problem proposed in the academic literature; therefore, we define a new problem class, the

  11. Autonomic symptoms in idiopathic REM behavior disorder

    DEFF Research Database (Denmark)

    Ferini-Strambi, Luigi; Oertel, Wolfgang; Dauvilliers, Yves

    2014-01-01

    Patients with idiopathic REM sleep behavior disorder (iRBD) are at very high risk of developing neurodegenerative synucleinopathies, which are disorders with prominent autonomic dysfunction. Several studies have documented autonomic dysfunction in iRBD, but large-scale assessment of autonomic...... symptoms has never been systematically performed. Patients with polysomnography-confirmed iRBD (318 cases) and controls (137 healthy volunteers and 181 sleep center controls with sleep diagnoses other than RBD) were recruited from 13 neurological centers in 10 countries from 2008 to 2011. A validated scale...

  12. Nature's Autonomous Oscillators

    Science.gov (United States)

    Mayr, H. G.; Yee, J.-H.; Mayr, M.; Schnetzler, R.

    2012-01-01

    Nonlinearity is required to produce autonomous oscillations without external time dependent source, and an example is the pendulum clock. The escapement mechanism of the clock imparts an impulse for each swing direction, which keeps the pendulum oscillating at the resonance frequency. Among nature's observed autonomous oscillators, examples are the quasi-biennial oscillation and bimonthly oscillation of the Earth atmosphere, and the 22-year solar oscillation. The oscillations have been simulated in numerical models without external time dependent source, and in Section 2 we summarize the results. Specifically, we shall discuss the nonlinearities that are involved in generating the oscillations, and the processes that produce the periodicities. In biology, insects have flight muscles, which function autonomously with wing frequencies that far exceed the animals' neural capacity; Stretch-activation of muscle contraction is the mechanism that produces the high frequency oscillation of insect flight, discussed in Section 3. The same mechanism is also invoked to explain the functioning of the cardiac muscle. In Section 4, we present a tutorial review of the cardio-vascular system, heart anatomy, and muscle cell physiology, leading up to Starling's Law of the Heart, which supports our notion that the human heart is also a nonlinear oscillator. In Section 5, we offer a broad perspective of the tenuous links between the fluid dynamical oscillators and the human heart physiology.

  13. Bilateral human-robot control for semi-autonomous UAV navigation

    NARCIS (Netherlands)

    Wopereis, Han Willem; Fumagalli, Matteo; Stramigioli, Stefano; Carloni, Raffaella

    2015-01-01

    This paper proposes a semi-autonomous bilateral control architecture for unmanned aerial vehicles. During autonomous navigation, a human operator is allowed to assist the autonomous controller of the vehicle by actively changing its navigation parameters to assist it in critical situations, such as

  14. Effects of insula resection on autonomic nervous system activity

    NARCIS (Netherlands)

    de Morree, Helma; Rutten, Geert-Jan; Szabo, B.M.; Sitskoorn, Margriet; Kop, Wijo

    2016-01-01

    Background: The insula is an essential component of the central autonomic network and plays a critical role in autonomic regulation in response to environmental stressors. The role of the insula in human autonomic regulation has been primarily investigated following cerebrovascular accidents, but

  15. Autonomous Cryogenics Loading Operations Simulation Software: Knowledgebase Autonomous Test Engineer

    Science.gov (United States)

    Wehner, Walter S., Jr.

    2013-01-01

    Working on the ACLO (Autonomous Cryogenics Loading Operations) project I have had the opportunity to add functionality to the physics simulation software known as KATE (Knowledgebase Autonomous Test Engineer), create a new application allowing WYSIWYG (what-you-see-is-what-you-get) creation of KATE schematic files and begin a preliminary design and implementation of a new subsystem that will provide vision services on the IHM (Integrated Health Management) bus. The functionality I added to KATE over the past few months includes a dynamic visual representation of the fluid height in a pipe based on number of gallons of fluid in the pipe and implementing the IHM bus connection within KATE. I also fixed a broken feature in the system called the Browser Display, implemented many bug fixes and made changes to the GUI (Graphical User Interface).

  16. The new context for transport of radioactive and nuclear material

    International Nuclear Information System (INIS)

    Anne, C.; Galtier, J.

    2002-01-01

    The transportation of radioactive and nuclear materials involves all modes of transportation with a predominance for road and for air. It is but a minute fraction dangerous good transportation. Around 10 millions of radioactive packages are shipped annually all over the world of which ninety percent total corresponds to shipments of radioisotopes. In spite of the small volume transported, experience, evolution of transport means and technologies, the trend to constantly improve security and safety and public acceptance have modified the transport environment. During the last few years, new evolutions have applied to the transport of radioactive and nuclear materials in various fields and especially: - Safety - Security - Logistics means - Public acceptance - Quality Assurance. We propose to examine the evolution of these different fields and their impact on transportation methods and means. (authors)

  17. Towards an autonomous system for handling inter-terminal container transport

    NARCIS (Netherlands)

    dr. J.H.R. van Duin; ir. F.G. Rieck; A. Spruit

    2017-01-01

    As part of the National Transition Board Practice Research Raak/SIA program, the INTRALOG (intelligent Truck Application in Logistics) project investigated the practical application of zero emission Automatic Guided Trucks (AGTs) for the transport of containers in the Harbour Industrial Cluster

  18. Demonstration of Autonomous Rendezvous Technology (DART) Project Summary

    Science.gov (United States)

    Rumford, TImothy E.

    2003-01-01

    Since the 1960's, NASA has performed numerous rendezvous and docking missions. The common element of all US rendezvous and docking is that the spacecraft has always been piloted by astronauts. Only the Russian Space Program has developed and demonstrated an autonomous capability. The Demonstration of Autonomous Rendezvous Technology (DART) project currently funded under NASA's Space Launch Initiative (SLI) Cycle I, provides a key step in establishing an autonomous rendezvous capability for the United States. DART's objective is to demonstrate, in space, the hardware and software necessary for autonomous rendezvous. Orbital Sciences Corporation intends to integrate an Advanced Video Guidance Sensor and Autonomous Rendezvous and Proximity Operations algorithms into a Pegasus upper stage in order to demonstrate the capability to autonomously rendezvous with a target currently in orbit. The DART mission will occur in April 2004. The launch site will be Vandenburg AFB and the launch vehicle will be a Pegasus XL equipped with a Hydrazine Auxiliary Propulsion System 4th stage. All mission objectives will be completed within a 24 hour period. The paper provides a summary of mission objectives, mission overview and a discussion on the design features of the chase and target vehicles.

  19. Examining accident reports involving autonomous vehicles in California.

    Directory of Open Access Journals (Sweden)

    Francesca M Favarò

    Full Text Available Autonomous Vehicle technology is quickly expanding its market and has found in Silicon Valley, California, a strong foothold for preliminary testing on public roads. In an effort to promote safety and transparency to consumers, the California Department of Motor Vehicles has mandated that reports of accidents involving autonomous vehicles be drafted and made available to the public. The present work shows an in-depth analysis of the accident reports filed by different manufacturers that are testing autonomous vehicles in California (testing data from September 2014 to March 2017. The data provides important information on autonomous vehicles accidents' dynamics, related to the most frequent types of collisions and impacts, accident frequencies, and other contributing factors. The study also explores important implications related to future testing and validation of semi-autonomous vehicles, tracing the investigation back to current literature as well as to the current regulatory panorama.

  20. Examining accident reports involving autonomous vehicles in California.

    Science.gov (United States)

    Favarò, Francesca M; Nader, Nazanin; Eurich, Sky O; Tripp, Michelle; Varadaraju, Naresh

    2017-01-01

    Autonomous Vehicle technology is quickly expanding its market and has found in Silicon Valley, California, a strong foothold for preliminary testing on public roads. In an effort to promote safety and transparency to consumers, the California Department of Motor Vehicles has mandated that reports of accidents involving autonomous vehicles be drafted and made available to the public. The present work shows an in-depth analysis of the accident reports filed by different manufacturers that are testing autonomous vehicles in California (testing data from September 2014 to March 2017). The data provides important information on autonomous vehicles accidents' dynamics, related to the most frequent types of collisions and impacts, accident frequencies, and other contributing factors. The study also explores important implications related to future testing and validation of semi-autonomous vehicles, tracing the investigation back to current literature as well as to the current regulatory panorama.

  1. Examining accident reports involving autonomous vehicles in California

    Science.gov (United States)

    Nader, Nazanin; Eurich, Sky O.; Tripp, Michelle; Varadaraju, Naresh

    2017-01-01

    Autonomous Vehicle technology is quickly expanding its market and has found in Silicon Valley, California, a strong foothold for preliminary testing on public roads. In an effort to promote safety and transparency to consumers, the California Department of Motor Vehicles has mandated that reports of accidents involving autonomous vehicles be drafted and made available to the public. The present work shows an in-depth analysis of the accident reports filed by different manufacturers that are testing autonomous vehicles in California (testing data from September 2014 to March 2017). The data provides important information on autonomous vehicles accidents’ dynamics, related to the most frequent types of collisions and impacts, accident frequencies, and other contributing factors. The study also explores important implications related to future testing and validation of semi-autonomous vehicles, tracing the investigation back to current literature as well as to the current regulatory panorama. PMID:28931022

  2. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  3. Tactical Decision Aids High Bandwidth Links Using Autonomous Vehicles

    Science.gov (United States)

    2004-01-01

    1 Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) A. J. Healey, D. P. Horner, Center for Autonomous Underwater Vehicle...SUBTITLE Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  4. A Stronger EU in Cosmos: Embracing the Concept of Space Security

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2016-09-01

    Full Text Available The recently unveiled EU Global Strategy for Foreign and Security Policy presents bold and ambitious plans in several increasingly important domains for Europe, including outer space. The EU has committed itself to securing an autonomous access to space, providing security for its space-based assets, and promoting the adoption of a voluntary code of conduct in space. With the evolving dynamics in astropolitics, space security has become an ever more important aspect of space activities. Clearly, the EU has a vested interest in space security, whereas space-enabled services form an important part of European economy and contribute to effective implementation of its energy policy, migration, border control as well as domestic and international crisis management. Since the EU is currently in the process of drafting a European Space Strategy, it should seize the opportunity to take stock of its existing space programs and lay out a promising way forward. Besides reinforcing the existing Copernicus and Galileo programs and further developing the Governmental Satellite Communications (GOVSATCOM project, the EU should make a significant investment in space security, particularly through boosting its Space Surveillance and Tracking (SST capabilities and actively working on the international fora to promote a responsible behavior in outer space that could be eventually transformed into a voluntary international code of conduct. Through a comprehensive space policy and by reinforcing its autonomy in outer space, the EU will not only strengthen its foreign and security policy, but also reconfirm its relevant role in global affairs.

  5. Autonomous Cryogenic Load Operations: Knowledge-Based Autonomous Test Engineer

    Science.gov (United States)

    Schrading, J. Nicolas

    2013-01-01

    The Knowledge-Based Autonomous Test Engineer (KATE) program has a long history at KSC. Now a part of the Autonomous Cryogenic Load Operations (ACLO) mission, this software system has been sporadically developed over the past 20 years. Originally designed to provide health and status monitoring for a simple water-based fluid system, it was proven to be a capable autonomous test engineer for determining sources of failure in the system. As part of a new goal to provide this same anomaly-detection capability for a complicated cryogenic fluid system, software engineers, physicists, interns and KATE experts are working to upgrade the software capabilities and graphical user interface. Much progress was made during this effort to improve KATE. A display of the entire cryogenic system's graph, with nodes for components and edges for their connections, was added to the KATE software. A searching functionality was added to the new graph display, so that users could easily center their screen on specific components. The GUI was also modified so that it displayed information relevant to the new project goals. In addition, work began on adding new pneumatic and electronic subsystems into the KATE knowledge base, so that it could provide health and status monitoring for those systems. Finally, many fixes for bugs, memory leaks, and memory errors were implemented and the system was moved into a state in which it could be presented to stakeholders. Overall, the KATE system was improved and necessary additional features were added so that a presentation of the program and its functionality in the next few months would be a success.

  6. Investigating power control in autonomous power systems with increasing wind power penetration

    Energy Technology Data Exchange (ETDEWEB)

    Margaris, Ioannis D. [National Technical Univ. of Athens (Greece). Electric Energy Systems Lab.; Hansen, Anca D.; Sorensen, Poul [Risoe National Laboratory, Roskilde (Denmark). Wind Energy Dept.; Hatziargyriou, Nikos D. [National Technical Univ. of Athens (Greece). Electric Energy Systems Lab.; Public Power Corporation S.A., Athens (Greece)

    2009-07-01

    Increasing levels of wind penetration in autonomous power systems has set intensively high standards with respect to wind turbine technology during the last years. Special features of non-interconnected power systems make security issues rather critical, as the operation of large wind farms like conventional power plants is becoming a necessity. This paper includes the study case of Rhodos island, in Greece, where rapidly increasing wind penetration has started to impose serious security issues for the immediate future. The scenarios studied here correspond to reference year of study 2012 and include wind farms with three different wind turbine technologies - namely Doubly Fed Induction Generator (DFIG), Permanent Magnet Synchronous Generator (PMSG) and Active Stall Induction Generator (ASIG) based wind turbines. Aggregated models of the wind farms are being used and results for different load cases are being analyzed and discussed. The ability of wind farms to assist in some of the power system control services traditionally carried out by conventional synchronous generation is being investigated and discussed. The power grid of the island, including speed governors and automatic voltage regulators, is simulated in the dedicated power system simulation program Power Factory from DIgSILENT. (orig.)

  7. Design of Autonomous Gel Actuators

    Directory of Open Access Journals (Sweden)

    Shuji Hashimoto

    2011-01-01

    Full Text Available In this paper, we introduce autonomous gel actuators driven by chemical energy. The polymer gels prepared here have cyclic chemical reaction networks. With a cyclic reaction, the polymer gels generate periodical motion. The periodic motion of the gel is produced by the chemical energy of the oscillatory Belouzov-Zhabotinsky (BZ reaction. We have succeeded in making synthetic polymer gel move autonomously like a living organism. This experimental fact represents the great possibility of the chemical robot.

  8. Incorporating security into the transportation planning process.

    Science.gov (United States)

    2009-03-01

    The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those di...

  9. Longitudinal Control for Mengshi Autonomous Vehicle via Gauss Cloud Model

    Directory of Open Access Journals (Sweden)

    Hongbo Gao

    2017-12-01

    Full Text Available Dynamic robustness and stability control is a requirement for self-driving of autonomous vehicle. Longitudinal control technique of autonomous vehicle is basic theory and one key complex technique which must have the reliability and precision of vehicle controller. The longitudinal control technique is one of the foundations of the safety and stability of autonomous vehicle control. In our paper, we present a longitudinal control algorithm based on cloud model for Mengshi autonomous vehicle to ensure the dynamic stability and tracking performance of Mengshi autonomous vehicle. The longitudinal control algorithm mainly uses cloud model generator to control the acceleration of the autonomous vehicle to achieve the goal that controls the speed of Mengshi autonomous vehicle. The proposed longitudinal control algorithm based on cloud model is verified by real experiments on Highway driving scene. The experiments results of the acceleration and speed show that the algorithm is validity and stability.

  10. Autonomic dysfunction in cirrhosis and portal hypertension

    DEFF Research Database (Denmark)

    Dümcke, Christine Winkler; Møller, Søren

    2008-01-01

    Liver cirrhosis and portal hypertension are frequently associated with signs of circulatory dysfunction and peripheral polyneuropathy, which includes defects of the autonomic nervous system. Autonomic dysfunction, which is seen in both alcoholic and non-alcoholic liver cirrhosis and increases...

  11. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Science.gov (United States)

    2010-07-01

    ... national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2... rate established * * * for transportation provided to the U.S. Government would endanger the National...

  12. Symmetries and solutions of the non-autonomous von Bertalanffy equation

    Science.gov (United States)

    Edwards, Maureen P.; Anderssen, Robert S.

    2015-05-01

    For growth in a closed environment, which is indicative of the situation in laboratory experiments, autonomous ODE models do not necessarily capture the dynamics under investigation. The importance and impact of a closed environment arise when the question under examination relates, for example, to the number of the surviving microbes, such as in a study of the spoilage and contamination of food, the gene silencing activity of fungi or the production of a chemical compound by bacteria or fungi. Autonomous ODE models are inappropriate as they assume that only the current size of the population controls the growth-decay dynamics. This is reflected in the fact that, asymptotically, their solutions can only grow or decay monotonically or asymptote. Non-autonomous ODE models are not so constrained. A natural strategy for the choice of non-autonomous ODEs is to take appropriate autonomous ones and change them to be non-autonomous through the introduction of relevant non-autonomous terms. This is the approach in this paper with the focus being the von Bertalanffy equation. Since this equation has independent importance in relation to practical applications in growth modelling, it is natural to explore the deeper relationships between the introduced non-autonomous terms through a symmetry analysis, which is the purpose and goal of the current paper. Infinitesimals are derived which allow particular forms of the non-autonomous von Bertalanffy equation to be transformed into autonomous forms for which some new analytic solutions have been found.

  13. Autonomy Level Specification for Intelligent Autonomous Vehicles

    Science.gov (United States)

    2003-09-01

    Autonomy Level Specification for Intelligent Autonomous Vehicles : Interim Progress Report Hui-Min Huang, Elena Messina, James Albus...Level Specification for Intelligent Autonomous Vehicles : Interim Progress Report 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  14. CSIR eNews: Mobile Intelligent Autonomous Systems

    CSIR Research Space (South Africa)

    CSIR

    2008-03-01

    Full Text Available autonomous systems Distinguished scientist from India to share knowledge with CSIR An esteemed scientist from India, Dr Jitendra Raol, will spend the next 14 months at the CSIR, specifically in the mobile intelligence autonomous systems (MIAS) emerging...

  15. Digital intelligence sources transporter

    International Nuclear Information System (INIS)

    Zhang Zhen; Wang Renbo

    2011-01-01

    It presents from the collection of particle-ray counting, infrared data communication, real-time monitoring and alarming, GPRS and other issues start to realize the digital management of radioactive sources, complete the real-time monitoring of all aspects, include the storing of radioactive sources, transporting and using, framing intelligent radioactive sources transporter, as a result, achieving reliable security supervision of radioactive sources. (authors)

  16. What Isn't Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2011-01-01

    The year 2011 marks the 50th anniversary of the first IAEA regulations governing the transport of radioactive material. However transport safety at the IAEA obviously predates this, since the regulations took time to develop. In 1957, GC. 1/1 already states: 'The Agency should undertake studies with a view to the establishment of regulations relating to the international transportation of radioactive materials. ...'. And goes further: 'The transport of radioisotopes and radiation sources has brought to light many problems and involves the need for uniform packaging and shipping regulations ... facilitate the acceptance of such materials by sea and air carriers'. This conference reiterates the challenge given then through the sub-title 'The next fifty years - Creating a Safe, Secure and Sustainable Framework'. Looking back, we can see that the sustainable framework was a goal in 1957, where radioactive material could be transported should it be desired. Since these early days we have added to safety the need to ensure security. However we still see the same calls today to eradicate denial of shipment, which might suggest we have not progressed. But the picture today is very different - we have today well established requirements for safe transport of radioactive material, and the recommendations for security in transport are coming of age for all radioactive materials. The outstanding issue would seem to be harmonisation, not just between safety and security in IAEA documents, but also harmonisation between Member States.

  17. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  18. Transport safety of irradiated fuel; Seguridad en el transporte de combustible irradiado.

    Energy Technology Data Exchange (ETDEWEB)

    Rosa Giménez, R. de la

    2016-07-01

    The complication of the transport of spent fuel is significant not only because of the danger of the transported good itself but also for the size of the package. The number of this kind of expeditions are supposed to increase considerably in the coming years, for that reason is necessary for specialized companies such as ETSA be prepared. To this end, ETSA has already implemented most of the measures necessary to ensure safety - security of transport, not only during its execution but throughout the preparation.

  19. Multiple Autonomous Vehicles for Minefield Reconnaissance and Mapping

    Science.gov (United States)

    1997-12-01

    NPS-ME-97-008 NAVAL POSTGRADUATE SCHOOL Monterey, California ItC A D- 19980421 131 =C QUALTY Ui Ji.CTEJ) THESIS MULTIPLE AUTONOMOUS VEHICLES FOR...MULTIPLE AUTONOMOUS VEHICLES FOR MINEFIELD 5. FUNDING NUMBERS RECONNAISSANCE AND MAPPING N0001497WX30039 6. AUTHOR(S) Jack A. Starr 7. PERFORMING... AUTONOMOUS VEHICLES FOR MINEFIELD RECONNAISSANCE AND MAPPING Jack A. Starr Lieutenant, United States Navy B.S., Oregon State University, 1991 Submitted in

  20. Estimated routine radiation doses to transportation workers in alternative spent-fuel transportation systems

    International Nuclear Information System (INIS)

    Schneider, K.J.; Smith, R.I.; Daling, P.M.; Ross, W.A.; McNair, G.W.

    1988-01-01

    The federal system for the management of spent fuel and high-level radioactive waste includes the acceptance by the US Department of Energy (DOE) of the spent fuel or waste loaded in casks at the reactor or other waste generators, its transportation to a repository, and its handling and final emplacement in the repository. The DOE plans to implement a transportation system that is safe, secure, efficient, and cost-effective and will meet applicable regulatory safety and security requirements. The DOE commissioned the Pacific Northwest Laboratory (PNL) to develop estimates of the routine radiation doses that would result from the operation of a system postulated using current designs and practices. From that evaluation, PNL identified activities/operations that result in the higher fraction of doses, proposed conceptual alternatives that would effectively reduce such exposures, and evaluated the cost-effectiveness of such alternatives. The study is one of a series used in making overall system design and operational decisions in the development of the DOE's spent-fuel/high-level waste transportation system. This paper contains the highlights from the PNL study of the estimated radiation doses to the transportation workers in a postulated reference transportation system and potential alternatives to that system

  1. Technologies for highly miniaturized autonomous sensor networks

    NARCIS (Netherlands)

    Baert, K.; Gyselinckx, B.; Torfs, T.; Leonov, V.; Yazicioglu, F.; Brebels, S.; Donnay, S.; Vanfleteren, J.; Beyne, E.; Hoof, C. van

    2006-01-01

    Recent results of the autonomous sensor research program HUMAN++ will be summarized in this paper. The research program aims to achieve highly miniaturized and (nearly) autonomous sensor systems that assist our health and comfort. Although the application examples are dedicated to human

  2. Economy of the Arctic “Islands”: The Case of Nenets and Chukotka Autonomous Okrugs

    Directory of Open Access Journals (Sweden)

    Alexander Nikolayevich Pelyasov

    2017-03-01

    Full Text Available The article discusses the economy of Arctic «islands». These territories of the Russian Arctic are unavailable by transport all the year round and have considerable specificity in comparison with the other regions of the Russian and North European Arctic. The authors consider the economy of Arctic «islands» on the example of the Nenets and Chukotka Autonomous Areas. Despite the significant similarity in the economic and social parameters, after careful study, two regions show considerable internal differences. In order to identify dissimilarity, in the comparative analysis, we use the theoretical idea of the Arctic economy as a unity of three sectors — the traditional one, corporate (market one and transfer (state one. Each sector has the key contradictions, structures and its trajectory of evolution. The comparison of traditional sectors reveals significant landscape diversity of Chukotka in comparison with the Nenets tundra. The corporate sector of the Nenets Autonomous Okrug economy is significantly younger than in Chukotka, due to the fact that oil and gas development is relatively new practice for the region. On the other hand, because of the mining development of Chukotka gold, which started in 1960-s, it can be considered as an old industrial region. The level of the profitability of gold production is significantly lower than of the Nenets oil production. Therefore, we propose to include the economy of the Nenets Autonomous Okrug to the rental model, and Chukotka economy to the transfer model. The difference of transfer sectors of two areas is the result of not only the difference in the power of the regional budgets, but also of the urban settlement structure which is centralized in the Nenets Autonomous Okrug and polycentric in Chukotka. It means that the public health and culture in the Nenets Autonomous Okrug are dated generally for the capital of Naryan-Mar, and social facilities in Chukotka are significantly decentralized and

  3. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    Science.gov (United States)

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  4. Autonomous Industrial Mobile Manipulation (AIMM)

    DEFF Research Database (Denmark)

    Hvilshøj, Mads; Bøgh, Simon; Nielsen, Oluf Skov

    2012-01-01

    Purpose - The purpose of this paper is to provide a review of the interdisciplinary research field Autonomous Industrial Mobile Manipulation (AIMM), with an emphasis on physical implementations and applications. Design/methodology/approach - Following an introduction to AIMM, this paper investiga......Purpose - The purpose of this paper is to provide a review of the interdisciplinary research field Autonomous Industrial Mobile Manipulation (AIMM), with an emphasis on physical implementations and applications. Design/methodology/approach - Following an introduction to AIMM, this paper......; sustainability, configuration, adaptation, autonomy, positioning, manipulation and grasping, robot-robot interaction, human-robot interaction, process quality, dependability, and physical properties. Findings - The concise yet comprehensive review provides both researchers (academia) and practitioners (industry......) with a quick and gentle overview of AIMM. Furthermore, the paper identifies key open issues and promising research directions to realize real-world integration and maturation of the AIMM technology. Originality/value - This paper reviews the interdisciplinary research field Autonomous Industrial Mobile...

  5. Autonomic neuropathy in diabetes mellitus

    Directory of Open Access Journals (Sweden)

    Alberto eVerrotti

    2014-12-01

    Full Text Available Diabetic autonomic neuropathy (DAN is a serious and common complication of diabetes, often overlooked and misdiagnosed. It is a systemic-wide disorder that may be asymptomatic in the early stages. The most studied and clinically important form of DAN is cardiovascular autonomic neuropathy (CAN defined as the impairment of autonomic control of the cardiovascular system in patients with diabetes after exclusion of other causes. The reported prevalence of DAN varies widely depending on inconsistent definition, different diagnostic method, different patient cohorts studied. The pathogenesis is still unclear and probably multifactorial. Once DAN becomes clinically evident, no form of therapy has been identified which can effectively stop or reverse it. Prevention strategies are based on strict glycemic control with intensive insulin treatment, multifactorial intervention and lifestyle modification including control of hypertension, dyslipidemia, stop smoking, weight loss and adequate physical exercise. The present review summarizes the latest knowledge regarding clinical presentation, epidemiology, pathogenesis and management of DAN, with some mention to childhood and adolescent population.

  6. From Extended Nanofluidics to an Autonomous Solar-Light-Driven Micro Fuel-Cell Device.

    Science.gov (United States)

    Pihosh, Yuriy; Uemura, Jin; Turkevych, Ivan; Mawatari, Kazuma; Kazoe, Yutaka; Smirnova, Adelina; Kitamori, Takehiko

    2017-07-03

    Autonomous micro/nano mechanical, chemical, and biomedical sensors require persistent power sources scaled to their size. Realization of autonomous micro-power sources is a challenging task, as it requires combination of wireless energy supply, conversion, storage, and delivery to the sensor. Herein, we realized a solar-light-driven power source that consists of a micro fuel cell (μFC) and a photocatalytic micro fuel generator (μFG) integrated on a single microfluidic chip. The μFG produces hydrogen by photocatalytic water splitting under solar light. The hydrogen fuel is then consumed by the μFC to generate electricity. Importantly, the by-product water returns back to the photocatalytic μFG via recirculation loop without losses. Both devices rely on novel phenomena in extended-nano-fluidic channels that ensure ultra-fast proton transport. As a proof of concept, we demonstrate that μFG/μFC source achieves remarkable energy density of ca. 17.2 mWh cm -2 at room temperature. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Hard-real-time resource management for autonomous spacecraft

    Science.gov (United States)

    Gat, E.

    2000-01-01

    This paper describes tickets, a computational mechanism for hard-real-time autonomous resource management. Autonomous spacecraftcontrol can be considered abstractly as a computational process whose outputs are spacecraft commands.

  8. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  9. Current issues in the impacts of transport on health.

    Science.gov (United States)

    van Schalkwyk, M C I; Mindell, J S

    2018-03-01

    Transport affects health in many ways. Benefits include access to education, employment, goods, services and leisure, and opportunities for incorporating physical activity into daily living. There are major inequalities: benefits generally accrue to wealthier people and harms to the more deprived, nationally and globally. Health on the Move 2; Journal of Transport and Health. Benefits of travel for access and physical activity. Harms include health impacts of air and noise pollution; injuries and fatalities from falls or collisions; sedentary behaviour with motorized transport; community severance (barrier effect of busy roads and transport infrastructure); global climate change; impacts on inequalities; transport's role in facilitating spread of communicable diseases. Biofuels; cycle safety; driving by older people. Effects of default 20 mph speed limits; impacts of autonomous vehicles on health and inequalities.

  10. AREVA Logistics Business Unit Transportation Risk Management Initiative

    International Nuclear Information System (INIS)

    Anne, C.

    2009-01-01

    A safe, secure and reliable transportation organization is a key component for the success of the nuclear industry. With the forecasted increase of radioactive material transport flows in future and the changing environment, AREVA Logistic Business Unit (L-BU) must ensure that safety and security risks are minimized but also ensure of the chain supply for its various facilities (mines, conversion, enrichment, fuel manufacturing, reprocessing, etc). AREVA L-BU Unit is implementing a transportation risk management initiative for the radioactive shipments of the AREVA group across all the Business Unit involved in shipments of radioactive and nuclear materials. The paper will present the four main components of the risk management. (authors)

  11. Communications issues for international radioactive materials transport, Post 9/11

    Energy Technology Data Exchange (ETDEWEB)

    Brown, A.A. [International Transport, BNFL, Warrington, Cheshire (United Kingdom); Hartenstein, M. [Transport External Affairs, Marketing, Sales and Projects Div., Cogema Logistics, Saint Quentin en Yvelines (France); Nawano, M. [Transport Headquarters, Overseas Reprocessing Committee, Tokyo (Japan)

    2004-07-01

    The terrorist attacks of September 11{sup th} 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security.

  12. Communications issues for international radioactive materials transport, Post 9/11

    International Nuclear Information System (INIS)

    Brown, A.A.; Hartenstein, M.; Nawano, M.

    2004-01-01

    The terrorist attacks of September 11 th 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security

  13. College English Students’ Autonomous Learning Motivation and Cultivation Model Research

    Institute of Scientific and Technical Information of China (English)

    王艳荣; 李娥

    2015-01-01

    Studying the autonomous learning motivation and excitation model can stimulate intrinsic motivation of foreign language learners,develop students self-management strategy evaluation are very necessary.The purpose of this paper is to give students the skills of listening and speaking for their autonomous learning.Then study the cultivation and motivation of college English students autonomous learning,hoping to make students to learn autonomous learning and stimulate their motivation fully.

  14. The IRSN has appraised the security of the TN 117 parcel model loaded with new or irradiated fuels

    International Nuclear Information System (INIS)

    2009-10-01

    This document reports the examination made by the IRSN on the security of a parcel design which is to be used for the transportation of new or irradiated nuclear fuels and more precisely for the transportation of fissile radionuclides with a high radioactivity. According to this content, this packaging must therefore comply with some radioactive material transport security regulations which correspond to specific mechanical, thermal and immersion requirements. After a description of the parcel design, this report comments the experimental and numerical results of the parcel structural analysis, and recommends some further investigations. It also briefly comments the results of a thermal analysis, and of a security-criticality analysis. The parcel security appears to depend on the fuel pencil watertightness

  15. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  16. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  17. Tracked robot controllers for climbing obstacles autonomously

    Science.gov (United States)

    Vincent, Isabelle

    2009-05-01

    Research in mobile robot navigation has demonstrated some success in navigating flat indoor environments while avoiding obstacles. However, the challenge of analyzing complex environments to climb obstacles autonomously has had very little success due to the complexity of the task. Unmanned ground vehicles currently exhibit simple autonomous behaviours compared to the human ability to move in the world. This paper presents the control algorithms designed for a tracked mobile robot to autonomously climb obstacles by varying its tracks configuration. Two control algorithms are proposed to solve the autonomous locomotion problem for climbing obstacles. First, a reactive controller evaluates the appropriate geometric configuration based on terrain and vehicle geometric considerations. Then, a reinforcement learning algorithm finds alternative solutions when the reactive controller gets stuck while climbing an obstacle. The methodology combines reactivity to learning. The controllers have been demonstrated in box and stair climbing simulations. The experiments illustrate the effectiveness of the proposed approach for crossing obstacles.

  18. Autonomic Cluster Management System (ACMS): A Demonstration of Autonomic Principles at Work

    Science.gov (United States)

    Baldassari, James D.; Kopec, Christopher L.; Leshay, Eric S.; Truszkowski, Walt; Finkel, David

    2005-01-01

    Cluster computing, whereby a large number of simple processors or nodes are combined together to apparently function as a single powerful computer, has emerged as a research area in its own right. The approach offers a relatively inexpensive means of achieving significant computational capabilities for high-performance computing applications, while simultaneously affording the ability to. increase that capability simply by adding more (inexpensive) processors. However, the task of manually managing and con.guring a cluster quickly becomes impossible as the cluster grows in size. Autonomic computing is a relatively new approach to managing complex systems that can potentially solve many of the problems inherent in cluster management. We describe the development of a prototype Automatic Cluster Management System (ACMS) that exploits autonomic properties in automating cluster management.

  19. A Game Theory Based Solution for Security Challenges in CRNs

    Science.gov (United States)

    Poonam; Nagpal, Chander Kumar

    2018-03-01

    Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.

  20. Nuclear safeguards and security: we can do better.

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G. (Roger G.); Warner, Jon S.; Garcia, A. R. E. (Anthony R. E.); Martinez, R. K. (Ronald K.); Lopez, L. N. (Leon N.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Herrera, A. M. (Alicia M.); Bitzer, E. G. (Edward G.), III

    2005-01-01

    There are a number of practical ways to significantly improve nuclear safeguards and security. These include recognizing and minimizing the insider threat; using adversarial vulnerability assessments to find vulnerabilities and countermeasures; fully appreciating the disparate nature of domestic and international nuclear safeguards; improving tamper detection and tamper-indicating seals; not confusing the inventory and security functions; and recognizing the limitations of GPS tracking, contact memory buttons, and RFID tags. The efficacy of nuclear safeguards depends critically on employing sophisticated security strategies and effective monitoring hardware. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has extensively researched issues associated with nuclear safeguards, especially in the areas of tamper/intrusion detection, transport security, and vulnerability assessments. This paper discusses some of our findings, recommendations, and warnings.

  1. Low carbon scenarios for transport in India: Co-benefits analysis

    International Nuclear Information System (INIS)

    Dhar, Subash; Shukla, Priyadarshi R.

    2015-01-01

    Dependence on oil for transport is a concern for India's policymakers on three counts – energy security, local environment and climate change. Rapid urbanisation and accompanying motorisation has created some of the most polluting cities in India and rising demand for oil is leading to higher imports, besides causing more CO 2 emissions. The government of India wants to achieve the climate goals through a sustainability approach that simultaneously addresses other environment and developmental challenges. This paper analyses a sustainable low carbon transport (SLCT) scenario based on sustainable strategies for passenger and freight mobility, vehicle technologies and fuel using global CO 2 prices that correspond to 2 °C global stabilisation target. The scenarios span from years 2010 to 2050 and are analysed using the energy system model-ANSWER MARKAL. The SLCT scenario has improved energy security (cumulative oil demand lower by 3100 Mtoe), improved air quality (PM 2.5 emissions never exceed the existing levels) and the cumulative CO 2 emissions are lower by 13 billion t CO 2 thereby showing that achieving development objectives with CO 2 co-benefits is feasible. -- Highlights: •India's BAU transitions pose challenges for energy security and climate change. •Sustainable transport policies deliver benefits for air quality and energy security. •Sustainable transport policies fall short of mitigation needed for 2 °C stabilisation. •Transport sector becomes increasingly dependent on electricity. •Low carbon policies are essential to clean transport and electricity generation

  2. Secure Communication in Vehicular Networks - PRESERVE Demo

    NARCIS (Netherlands)

    Lagana, M.; Feiri, Michael; Sall, M.; Lange, M.; Tomatis, A.; Papadimitratos, P.

    2012-01-01

    Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The near-deployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality

  3. Elements of Autonomous Self-Reconfigurable Robots

    DEFF Research Database (Denmark)

    Christensen, David Johan

    In this thesis, we study several central elements of autonomous self-reconfigurable modular robots. Unlike conventional robots such robots are: i) Modular, since robots are assembled from numerous robotic modules. ii) Reconfigurable, since the modules can be combined in a variety of ways. iii) Self......-reconfigurable, since the modules themselves are able to change how they are combined. iv) Autonomous, since robots control themselves without human guidance. Such robots are attractive to study since they in theory have several desirable characteristics, such as versatility, reliability and cheapness. In practice...... however, it is challenging to realize such characteristics since state-of-the-art systems and solutions suffer from several inherent technical and theoretical problems and limitations. In this thesis, we address these challenges by exploring four central elements of autonomous self-reconfigurable modular...

  4. Computer Security at Nuclear Facilities. Reference Manual (Arabic Edition)

    International Nuclear Information System (INIS)

    2011-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  5. Computer Security at Nuclear Facilities. Reference Manual (Russian Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  6. Computer Security at Nuclear Facilities. Reference Manual (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  7. Cooperative Control of Multiple Unmanned Autonomous Vehicles

    Science.gov (United States)

    2005-06-03

    I I Final Report 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Cooperative Control of Multiple Unmanned Autonomous Vehicles F49620-01-1-0337 6. AUTHOR(S... Autonomous Vehicles Final Report Kendall E. Nygard Department of Computer Science and Operations Research North Dakota State University Fargo, ND 58105-5164

  8. Lecture 13: Control System Cyber Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  9. Nanotechnology in the Security

    CERN Document Server

    Kruchinin, Sergei

    2015-01-01

    The topics discussed at the NATO Advanced Research Workshop "Nanotechnology in the Security Systems" included nanophysics,   nanotechnology,  nanomaterials, sensors, biosensors security systems, explosive  detection . There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nanoscience have demonstrated that fundamentally new physical phenomena  are found when systems are reduced in size with  dimensions, comparable to the fundamental microscopic  length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nanodevices. This work will be of interest to researchers working in spintronics, molecular electronics and quantum information processing.

  10. Integrating Safety and Security in the EU: Past developments and suggested ways forward

    International Nuclear Information System (INIS)

    Rossi, Loris

    2016-01-01

    The Framework provided by the UN Model Regulation for the Transport of Dangerous Goods is the core of the legislation on transport of radioactive material (and all classes of dangerous goods) in the EU. This has resulted in European agreements ADR, RID and ADN for international transport as well as a single directive for land transport within the EU. In addition the EU has adopted a range of directives and regulations dealing specifically with several aspects of safety of nuclear and radioactive material. While the overall safety framework is now well developed and fairly stable, a security framework is evolving, based on the IAEA recommendations. In the EU, several initiatives such as the CBRN action plan and the review of the application of telematics for the transport of dangerous goods will most likely result in more developments coming on stream in the near future. This suggests that an integrated approach would be beneficial to avoid divergent developments and to keep track of new developments in an orderly fashion. An integrated approach for a safe and secure supply chain for radioactive material is proposed. The framework for a supply chain can be built around the extensive corpus of legislation/recommendations and concepts that are already existing (such as the “Known Consignor” in the framework of the EU aviation security or the “Authorised Economic Operator” in the EU Community Custom Code). This would allow for the need to maintain control of the numerous proposals that are taking place. Advantages and drawbacks are outlined. More generally, the development of an integrated safe and secure supply chain would bring clarity and transparency to the overall system of provisions for a safe and secure management of radioactive material. (author)

  11. Transport Technologies and Policy Scenarios to 2050

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-10-15

    As part of the major WEC study on Scenarios to 2050, a specific investigation was undertaken on measures required in the transport sector to secure sustainable energy and sustainable mobility in the future. This report outlines the results conducted by a study group of international WEC transport experts and gives concrete policy recommendations to develop sustainable transport systems.

  12. Cyber security challenges in Smart Cities: Safety, security and privacy

    Science.gov (United States)

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  13. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  14. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  15. A System for Fast Navigation of Autonomous Vehicles

    Science.gov (United States)

    1991-09-01

    AD-A243 523 4, jj A System for Fast Navigation of Autonomous Vehicles Sanjiv Singh, Dai Feng, Paul Keller, Gary Shaffer, Wen Fan Shi, Dong Hun Shin...FUNDING NUMBERS A System for Fast Navigation of Autonomous Vehicles 6. AUTHOR(S) S. Singh, D. Feng, P. Keller, G. Shaffer, W.F. Shi, D.H. Shin, J. West...common in the control of autonomous vehicles to establish the necessary kinematic models but to ignore an explicit representation of the vehicle dynamics

  16. Energy policy in transport and transport policy

    International Nuclear Information System (INIS)

    Van Dender, Kurt

    2009-01-01

    Explanations for, and indirect evidence of, imperfections in the market for private passenger vehicle fuel economy suggest there is a reasonable case for combining fuel economy standards and fuel or carbon taxes to contribute to an energy policy that aims to reduce greenhouse gas emissions and improve energy security. Estimates of key elasticities, including the rebound effect, indicate that the positive and negative side-effects of fuel economy measures on transport activities and external costs are limited. However, an energy policy for transport does not replace a transport policy that aims to manage the main transport externalities including congestion and local pollution. Conventional marginal cost estimates and standard cost-benefit reasoning suggest that policies that address congestion and local pollution likely bring benefits at least as large as those from fuel economy measures. But the large uncertainty on the possible effects of greenhouse gas emissions constitutes a strong challenge for standard cost-benefit reasoning. Emerging results from methods to cope with this uncertainty suggest that policies to stimulate the widespread adoption of low-carbon technologies in transport are justified.

  17. Energy policy in transport and transport policy

    Energy Technology Data Exchange (ETDEWEB)

    Van Dender, Kurt [Joint Transport Research Centre of the International Transport Forum and the OECD, 2 rue Andre Pascale, F-75775 Paris Cedex 16 (France)

    2009-10-15

    Explanations for, and indirect evidence of, imperfections in the market for private passenger vehicle fuel economy suggest there is a reasonable case for combining fuel economy standards and fuel or carbon taxes to contribute to an energy policy that aims to reduce greenhouse gas emissions and improve energy security. Estimates of key elasticities, including the rebound effect, indicate that the positive and negative side-effects of fuel economy measures on transport activities and external costs are limited. However, an energy policy for transport does not replace a transport policy that aims to manage the main transport externalities including congestion and local pollution. Conventional marginal cost estimates and standard cost-benefit reasoning suggest that policies that address congestion and local pollution likely bring benefits at least as large as those from fuel economy measures. But the large uncertainty on the possible effects of greenhouse gas emissions constitutes a strong challenge for standard cost-benefit reasoning. Emerging results from methods to cope with this uncertainty suggest that policies to stimulate the widespread adoption of low-carbon technologies in transport are justified. (author)

  18. Towards autonomous vehicles.

    Science.gov (United States)

    2013-11-01

    We are moving towards an age of autonomous vehicles. Cycles of innovation initiated in the public and private sectors : have led one into another since the 1990s; and out of these efforts have sprung a variety of Advanced Driver Assistance : Systems ...

  19. Autonomous Flight in Unknown Indoor Environments

    OpenAIRE

    Bachrach, Abraham Galton; He, Ruijie; Roy, Nicholas

    2009-01-01

    This paper presents our solution for enabling a quadrotor helicopter, equipped with a laser rangefinder sensor, to autonomously explore and map unstructured and unknown indoor environments. While these capabilities are already commodities on ground vehicles, air vehicles seeking the same performance face unique challenges. In this paper, we describe the difficulties in achieving fully autonomous helicopter flight, highlighting the differences between ground and helicopter robots that make it ...

  20. Maritime Safety and Security Challenges – 3D Simulation Based Training

    OpenAIRE

    Christoph Felsenstein; Knud Benedict; Michael Baldauf

    2013-01-01

    Maritime Safety and Security on board ships very much depends on well trained crews. That is why training and exercising emergency response procedures as well as efficiency in reliable management are extremely necessary. On the other hand research as well as technological development in safety and security, tools and other kinds of technical and organizational systems contribute to further improvement and guarantee high levels of safety and security in maritime transportation. Simulation faci...