WorldWideScience

Sample records for securing high consequence

  1. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  2. RETHINKING THE GOVERNANCE OF SECURITY: THE PROBLEM OF UNCONSCIOUS CONSEQUENCES

    Directory of Open Access Journals (Sweden)

    CARLOS SOLAR FORNAZZARI

    2017-12-01

    Full Text Available Friesendorf and Daase, both researchers from the Peace Reasearch Institute Frankfurt (PRIF, establish in Rethinking Security Governance the problem of unforeseen consequences that are the result of the implementation of almost any security policy. The results of this book confirm that many, but not all, consequences are problematic, due in part to the fact that the effects of a security policy have become contingent on an infinity of factors that make it highly complex to attribute to what extent success was due or the failure of a particular policy.

  3. Consequence Prioritization Process for Potential High Consequence Events (HCE)

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Sarah G. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-10-31

    This document describes the process for Consequence Prioritization, the first phase of the Consequence-Driven Cyber-Informed Engineering (CCE) framework. The primary goal of Consequence Prioritization is to identify potential disruptive events that would significantly inhibit an organization’s ability to provide the critical services and functions deemed fundamental to their business mission. These disruptive events, defined as High Consequence Events (HCE), include both events that have occurred or could be realized through an attack of critical infrastructure owner assets. While other efforts have been initiated to identify and mitigate disruptive events at the national security level, such as Presidential Policy Directive 41 (PPD-41), this process is intended to be used by individual organizations to evaluate events that fall below the threshold for a national security. Described another way, Consequence Prioritization considers threats greater than those addressable by standard cyber-hygiene and includes the consideration of events that go beyond a traditional continuity of operations (COOP) perspective. Finally, Consequence Prioritization is most successful when organizations adopt a multi-disciplinary approach, engaging both cyber security and engineering expertise, as in-depth engineering perspectives are required to recognize and characterize and mitigate HCEs. Figure 1 provides a high-level overview of the prioritization process.

  4. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ruthruff, Joseph. R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Armstrong, Robert C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Davis, Benjamin Garry [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Mayo, Jackson R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific properties about analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest from both internal and external customers of Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquely positioned to advance the state-of-the-art with respect to several research and application areas within formal methods. This research project was a one-year effort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research & Development program to investigate the opportunities for formal methods to impact Sandia's present mission areas, more fully understand the needs of the research community in the area of formal methods and where Sandia can contribute, and clarify from those potential research paths those that would best advance the mission-area interests of Sandia. The accomplishments from this project reinforce the utility of formal methods in Sandia, particularly in areas relevant to Cyber Security, and set the stage for continued Sandia investments to ensure this capabilityis utilized and advanced within this laboratory to serve the national interest.

  5. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  6. An examination of the consequences in high consequence operations

    Energy Technology Data Exchange (ETDEWEB)

    Spray, S.D.; Cooper, J.A.

    1996-06-01

    Traditional definitions of risk partition concern into the probability of occurrence and the consequence of the event. Most safety analyses focus on probabilistic assessment of an occurrence and the amount of some measurable result of the event, but the real meaning of the ``consequence`` partition is usually afforded less attention. In particular, acceptable social consequence (consequence accepted by the public) frequently differs significantly from the metrics commonly proposed by risk analysts. This paper addresses some of the important system development issues associated with consequences, focusing on ``high consequence operations safety.``

  7. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs.

  8. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    International Nuclear Information System (INIS)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong

    2016-01-01

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs

  9. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  10. Security of highly radioactive sources in Nepal

    International Nuclear Information System (INIS)

    Shrestha, Kamal K.

    2010-01-01

    Subsequent to 9/11, concerned countries and UN agencies have taken especial interest in the security of highly radioactive sources throughout the world. The IAEA Nuclear Security Plan (2006-2009) consequently made as a result of UN Security Council Resolution 1540 is binding to all States. The Global Threat Reduction Initiative (GTRI) of the US and the Global Threat Reduction Programme (GTRP) of UK have assisted the four hospitals in Nepal having more than 1,000 Curies of radioactivity in their Cobalt-60 sources used for teletherapy. The physical upgrade of the security of the nuclear materials has also been launched in Nepal for prevention of theft with malicious intention or threats. In this presentation, the radioisotopes in Nepal that comes under different categories according to TECDOC-1355 of IAEA will be described. Problems and issues regarding the security and protection of radioactive sources at hospitals, academic and research institutions that could be prevalent in many developing counties too will be discussed by taking a case study of one of the cancer hospitals in Kathmandu valley. (author)

  11. Low-Incidence, High-Consequence Pathogens

    Centers for Disease Control (CDC) Podcasts

    2014-02-21

    Dr. Stephan Monroe, a deputy director at CDC, discusses the impact of low-incidence, high-consequence pathogens globally.  Created: 2/21/2014 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 2/26/2014.

  12. Assuring quality in high-consequence engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, Marcey L.; Kolb, Rachel R.

    2014-03-01

    In high-consequence engineering organizations, such as Sandia, quality assurance may be heavily dependent on staff competency. Competency-dependent quality assurance models are at risk when the environment changes, as it has with increasing attrition rates, budget and schedule cuts, and competing program priorities. Risks in Sandia's competency-dependent culture can be mitigated through changes to hiring, training, and customer engagement approaches to manage people, partners, and products. Sandia's technical quality engineering organization has been able to mitigate corporate-level risks by driving changes that benefit all departments, and in doing so has assured Sandia's commitment to excellence in high-consequence engineering and national service.

  13. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  14. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  15. Achieving strategic surety for high consequence software

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, G.M.

    1996-09-01

    A strategic surety roadmap for high consequence software systems under the High Integrity Software (HIS) Program at Sandia National Laboratories guides research in identifying methodologies to improve software surety. Selected research tracks within this roadmap are identified and described detailing current technology and outlining advancements to be pursued over the coming decade to reach HIS goals. The tracks discussed herein focus on Correctness by Design, and System Immunology{trademark}. Specific projects are discussed with greater detail given on projects involving Correct Specification via Visualization, Synthesis, & Analysis; Visualization of Abstract Objects; and Correct Implementation of Components.

  16. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  17. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  18. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  19. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  20. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  1. Suicide in high security hospital patients.

    Science.gov (United States)

    Jones, Roland M; Hales, Heidi; Butwell, Martin; Ferriter, Mike; Taylor, Pamela J

    2011-08-01

    People with mental disorder and people who are violent are separately recognised as being at high risk of suicide. People detained in high security hospitals are recognised for their violence to others, but perhaps less so for their suicide potential. We aimed to investigate suicide rates among such patients during and after their high security hospital residency, and to establish risk factors for suicide. We extracted data from the Special Hospitals' Case Register on each person resident at any time between 1 January 1972 and 31 December 2000. Suicide rates were calculated for the whole period. We compared rates to the general population using standardised mortality ratios (SMRs). We used poisson regression to estimate the effects of gender, legal category of detention, offending history and length of admission on the suicide rate. Of the 5,955 individuals, 218 completed suicide. The suicide rate was nearly 7 times higher among resident men (SMR 662, 95% CI 478-845) and over 40 times higher in resident women (SMR 4,012, 95% CI 2,526-5,498) than in the general population; it was 23 times higher (SMR 2,325, 95% CI 1,901-2,751) and 45 times higher (SMR 4,486, 95% CI 2,727-6,245) among post-discharge men and women, respectively. The suicide rate was significantly higher among women than men inside high security but not after discharge. The suicide rate among high security hospital patients was significantly higher than in the general population. Women were especially at risk while resident, whereas for men, the risk was higher after discharge.

  2. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    Science.gov (United States)

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events.

  3. Conflicts in the Horn of Africa and their Consequences on Sudan's Stability and Security

    Directory of Open Access Journals (Sweden)

    Elfatih Abdullahi Abdel Salam

    1995-06-01

    Full Text Available Armed conflicts in the Horn of Africa have been raging in that region for the last forty years with tragic consequences for human life and for economic advancement. These conflicts have three different, but overlapping dimensions: the intrastate, the interstate, and the global levels. The conflicts are of a decided relevance for the Sudan, and particularly to the rebellion in the southern Sudan. The lack of security and stability in southern Sudan forced hundreds of thousand southerners into neighbouring countries, especially Ethiopia and Uganda. Likewise, the Sudan hosted hundreds of thousands Eritreans, Ethiopians, and Ugandans caught in the crossfire of their national conflicts. This development not only created a heavy economic burden on these relatively poor and economically underdeveloped communities, but led to strained political relations among governments. The Sudan has deep-seated security concerns emanating from the tragic developments in that part of the world. It is argued that one practical step to defuse the situation is to look for political solutions for essentially political problems. The next step that follows logically from the first step is to establish economic cooperation arrangements with a view to creating a future economic community in that African region.

  4. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  5. A strategic surety roadmap for high consequence software

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, G.M.; Dalton, L.J.

    1995-12-31

    A strategic surety roadmap for high consequence software systems developed under the High Integrity Software (HIS) Program at Sandia National Laboratories is presented. Selected research tracks are identified and described detailing current technology and outlining advancements to be pursued over the coming decade to reach HIS goals.

  6. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  7. Simulation of high consequence areas for gas pipelines

    OpenAIRE

    Orlando Díaz-Parra; Enrique Vera-López

    2018-01-01

    The gas pipeline is used for the transport of natural gas at a great distance. Risks derived from the handling of a combustible material transported under high pressure, by pipelines that pass close to where people live, makes it necessary to adopt prevention, mitigation and control measures to reduce the effect in case of ignition of a gas leak. This work shows the development of a new mathematical model to determine areas of high consequence and their application, using widely available and...

  8. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  9. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  10. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  11. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  12. From performance to performativity: The legitimization of US security contracting and its consequences.

    Science.gov (United States)

    Krahmann, Elke

    2017-12-01

    Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity - that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.

  13. Simulation of high consequence areas for gas pipelines

    Directory of Open Access Journals (Sweden)

    Orlando Díaz-Parra

    2018-01-01

    Full Text Available The gas pipeline is used for the transport of natural gas at a great distance. Risks derived from the handling of a combustible material transported under high pressure, by pipelines that pass close to where people live, makes it necessary to adopt prevention, mitigation and control measures to reduce the effect in case of ignition of a gas leak. This work shows the development of a new mathematical model to determine areas of high consequence and their application, using widely available and easy to use software, such as Google Earth and Excel, to determine and visualize the area up to which the level of radiation can affect the integrity of people and buildings. The model takes into account the pressure drop into the gas pipeline from the compression station, the gas leakage rate and possible forms of gas ignition. This development is an alternative to the use of specialized software and highly trained personnel. The simulation is applied to a traced of the Miraflores-Tunja gas pipeline, using a macro developed in Excel to determine the impact area and compare it with the coordinates of the vulnerable areas. The zones where these areas intersect are constituted in high consequence areas and are identified along with the sections of the pipeline that affect them, to provide the operator with a risk analysis tool for the determination and visualization of the gas pipeline and its environment.

  14. High Security at a Low Cost

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions These dev......In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions...

  15. Proceedings of the High Consequence Operations Safety Symposium

    Energy Technology Data Exchange (ETDEWEB)

    1994-12-01

    Many organizations face high consequence safety situations where unwanted stimuli due to accidents, catastrophes, or inadvertent human actions can cause disasters. In order to improve interaction among such organizations and to build on each others` experience, preventive approaches, and assessment techniques, the High Consequence Operations Safety Symposium was held July 12--14, 1994 at Sandia National Laboratories, Albuquerque, New Mexico. The symposium was conceived by Dick Schwoebel, Director of the SNL Surety Assessment Center. Stan Spray, Manager of the SNL System Studies Department, planned strategy and made many of the decisions necessary to bring the concept to fruition on a short time scale. Angela Campos and about 60 people worked on the nearly limitless implementation and administrative details. The initial symposium (future symposia are planned) was structured around 21 plenary presentations in five methodology-oriented sessions, along with a welcome address, a keynote address, and a banquet address. Poster papers addressing the individual session themes were available before and after the plenary sessions and during breaks.

  16. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  17. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  18. 49 CFR 195.452 - Pipeline integrity management in high consequence areas.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Pipeline integrity management in high consequence... Management § 195.452 Pipeline integrity management in high consequence areas. (a) Which pipelines are covered... that could affect a high consequence area, including any pipeline located in a high consequence area...

  19. Video performance for high security applications

    International Nuclear Information System (INIS)

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  20. Assessments of high-consequence platforms: Issues and applications

    International Nuclear Information System (INIS)

    Digre, K.A.; Craig, M.J.K.

    1994-01-01

    An API task group has developed a process for the assessment of existing platforms to determine their fitness for purpose. This has been released as a draft supplement to API RP 2A-WSD, 20th edition. Details and the background of this work are described in a companion paper. The assessment of a platform's fitness for purpose involves firstly a definition of the platform's exposure; and secondly, an evaluation of the platform's predicted performance relative to the assessment criteria associated with that exposure. This paper deals with platforms in the high exposure category. That is, platforms whose potential failure consequences, in terms of potential life loss and environmental damage, are significant. The criteria for placement of a platform in a high exposure category are explained, as are the performance criteria demanded of these high exposure platforms. In the companion paper, the metocean assessment process and associated API-developed acceptance criteria are highlighted. This paper addresses primarily ice and seismic loading assessments and associated API-developed criteria, which are based on over thirty years of successful offshore operation and field experience, as well as extrapolation of land-based performance criteria. Three West Coast, USA production platforms are used for illustration

  1. After the Fall of Qaddafi: Political, Economic, and Security Consequences for Libya, Mali, Niger, and Algeria

    Directory of Open Access Journals (Sweden)

    Ricardo René Larémont

    2013-06-01

    Full Text Available On 20 October 2011, Muammar Qaddafi, the leader of Libya, was killed by members of a local militia in his hometown of Sirte. Qaddafi’s death and his regime’s end fractured a security structure that had brought some stability to Libya, Mali, Niger, and to a much lesser extent southern Algeria. Because of his regime’s demise, a new swathe of instability that comprises fractured, compromised, or failed states has emerged in the Sahelian region, giving ample opportunities to militant entrepreneurial groups that have organized and are inhibiting the re-creation of more stable states and societies.

  2. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  3. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  4. High-consequence analysis, evaluation, and application of select criteria

    International Nuclear Information System (INIS)

    Gutmanis, I.; Jaksch, J.A.

    1984-01-01

    A number of characteristics distinguish environmental risk from pollution problems. The characteristics make environmental risk problems harder to manage through existing regulatory, legal, and economic institutions. Hence, technologies involving environmental risk impose on society extremely difficult collective decisions. This paper is concerned with the process of reaching social decisions that involve low-probability, high-consequence outcomes. It is divided into five major parts. Part I contains the introduction. Part II reviews the two main classes of criteria that have been proposed for social decisions: approaches based on market mechanisms and their extension, and approaches associated with Rawls and Buchanan, which not only focus on outcomes, but also impose a set of minimal constraints on the process for reaching decisions and social consensus. Part III proposes a set of eight criteria for evaluating social decision processes. In Parts IV and V we investigate applying the criteria to two case studies -- one on nuclear waste disposal and the other on transportation of liquefied natural gas

  5. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  6. High enrichment to low enrichment core's conversion. Technical securities

    International Nuclear Information System (INIS)

    Abbate, P.; Madariaga, M.R.

    1990-01-01

    This work presents the fulfillment of the technical securities subscribed by INVAP S.E. for the conversion of a high enriched uranium core. The reactor (of 5 thermal Mw), built in the 50's and 60's, is of the 'swimming pool' type, with light water and fuel elements of the curve plates MTR type, enriched at 93.15 %. These are neutronic and thermohydraulic securities. (Author) [es

  7. Mechanisms of Evolution in High-Consequence Drug Resistance Plasmids.

    Science.gov (United States)

    He, Susu; Chandler, Michael; Varani, Alessandro M; Hickman, Alison B; Dekker, John P; Dyda, Fred

    2016-12-06

    The dissemination of resistance among bacteria has been facilitated by the fact that resistance genes are usually located on a diverse and evolving set of transmissible plasmids. However, the mechanisms generating diversity and enabling adaptation within highly successful resistance plasmids have remained obscure, despite their profound clinical significance. To understand these mechanisms, we have performed a detailed analysis of the mobilome (the entire mobile genetic element content) of a set of previously sequenced carbapenemase-producing Enterobacteriaceae (CPE) from the National Institutes of Health Clinical Center. This analysis revealed that plasmid reorganizations occurring in the natural context of colonization of human hosts were overwhelmingly driven by genetic rearrangements carried out by replicative transposons working in concert with the process of homologous recombination. A more complete understanding of the molecular mechanisms and evolutionary forces driving rearrangements in resistance plasmids may lead to fundamentally new strategies to address the problem of antibiotic resistance. The spread of antibiotic resistance among Gram-negative bacteria is a serious public health threat, as it can critically limit the types of drugs that can be used to treat infected patients. In particular, carbapenem-resistant members of the Enterobacteriaceae family are responsible for a significant and growing burden of morbidity and mortality. Here, we report on the mechanisms underlying the evolution of several plasmids carried by previously sequenced clinical Enterobacteriaceae isolates from the National Institutes of Health Clinical Center (NIH CC). Our ability to track genetic rearrangements that occurred within resistance plasmids was dependent on accurate annotation of the mobile genetic elements within the plasmids, which was greatly aided by access to long-read DNA sequencing data and knowledge of their mechanisms. Mobile genetic elements such as

  8. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  9. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  10. Consequences of corrosion of the high flux reactor channels

    International Nuclear Information System (INIS)

    1987-01-01

    The effects of corrosion can increase the probability of the channel losing its seal. In case of a slow leak, the phenomena happening can be considered as quasi-static. The closing of the safety valve takes place even before the leak water reaches the level of the exit window. In case of a fast leak in the case of helium filled channels, the dynamic effects are limited to the front part of the plug. As for the back part of the plug and the housing/safety valve unit, the consequences of a fast leak can be assimilated to those of a slow leak. This paper evaluates the results of an incident such as this for the reactor and the surrounding experimental zones

  11. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  12. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  13. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  14. Prevalence and consequences of substance use among high school ...

    African Journals Online (AJOL)

    Alcohol, khat and cigarettes were commonly used by both high school and college students in urban as well as rural areas. While the use patterns of the substances were related to the gender, education/age and religion of the users, no clear-cut patterns were observed in relation to several other factors including ...

  15. High plasma uric acid concentration: causes and consequences

    Directory of Open Access Journals (Sweden)

    de Oliveira Erick

    2012-04-01

    Full Text Available Abstract High plasma uric acid (UA is a precipitating factor for gout and renal calculi as well as a strong risk factor for Metabolic Syndrome and cardiovascular disease. The main causes for higher plasma UA are either lower excretion, higher synthesis or both. Higher waist circumference and the BMI are associated with higher insulin resistance and leptin production, and both reduce uric acid excretion. The synthesis of fatty acids (tryglicerides in the liver is associated with the de novo synthesis of purine, accelerating UA production. The role played by diet on hyperuricemia has not yet been fully clarified, but high intake of fructose-rich industrialized food and high alcohol intake (particularly beer seem to influence uricemia. It is not known whether UA would be a causal factor or an antioxidant protective response. Most authors do not consider the UA as a risk factor, but presenting antioxidant function. UA contributes to > 50% of the antioxidant capacity of the blood. There is still no consensus if UA is a protective or a risk factor, however, it seems that acute elevation is a protective factor, whereas chronic elevation a risk for disease.

  16. Integrated safeguards and security for a highly automated process

    International Nuclear Information System (INIS)

    Zack, N.R.; Hunteman, W.J.; Jaeger, C.D.

    1993-01-01

    Before the cancellation of the New Production Reactor Programs for the production of tritium, the reactors and associated processing were being designed to contain some of the most highly automated and remote systems conceived for a Department of Energy facility. Integrating safety, security, materials control and accountability (MC and A), and process systems at the proposed facilities would enhance the overall information and protection-in-depth available. Remote, automated fuel handling and assembly/disassembly techniques would deny access to the nuclear materials while upholding ALARA principles but would also require the full integration of all data/information systems. Such systems would greatly enhance MC and A as well as facilitate materials tracking. Physical protection systems would be connected with materials control features to cross check activities and help detect and resolve anomalies. This paper will discuss the results of a study of the safeguards and security benefits achieved from a highly automated and integrated remote nuclear facility and the impacts that such systems have on safeguards and computer and information security

  17. A probabilistic consequence assessment for a very high temperature reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Joeun; Kim, Jintae; Jae, Moosung [Hanyang Univ., Seoul (Korea, Republic of). Dept. of Nuclear Engineering

    2017-02-15

    Currently, fossil fuel is globally running out. If current trends continue, crude oil will be depleted in 20 years and natural gas in 40 years. In addition, the use of fossil resource has increased emissions of green gas such as carbon dioxide. Therefore, there has been a strong demand in recent years for producing large amounts of hydrogen as an alternative energy [1]. To generate hydrogen energy, very high temperature more than 900 C is required but this level is not easy to reach. Because a Very High Temperature Reactor (VHTR), one of next generation reactor, is able to make the temperature, it is regarded as a solution of the problem. Also, VHTR has an excellent safety in comparison with existing and other next generation reactors. Especially, a passive system, Reactor Cavity Cooling System (RCCS), is adopted to get rid of radiant heat in case of accidents. To achieve variety requirements of new designed-reactors, however, it needs to develop new methodologies and definitions different with existing method. At the same time, an application of probability safety assessment (PSA) has been proposed to ensure the safety of next generation NPPs. For this, risk-informed designs of structures have to be developed and verified. Particularly, the passive system requires to be evaluated for its reliability. The objective of this study is to improve safety of VIITR by conducting risk profile.

  18. Mechanisms of Evolution in High-Consequence Drug Resistance Plasmids

    Directory of Open Access Journals (Sweden)

    Susu He

    2016-12-01

    Full Text Available The dissemination of resistance among bacteria has been facilitated by the fact that resistance genes are usually located on a diverse and evolving set of transmissible plasmids. However, the mechanisms generating diversity and enabling adaptation within highly successful resistance plasmids have remained obscure, despite their profound clinical significance. To understand these mechanisms, we have performed a detailed analysis of the mobilome (the entire mobile genetic element content of a set of previously sequenced carbapenemase-producing Enterobacteriaceae (CPE from the National Institutes of Health Clinical Center. This analysis revealed that plasmid reorganizations occurring in the natural context of colonization of human hosts were overwhelmingly driven by genetic rearrangements carried out by replicative transposons working in concert with the process of homologous recombination. A more complete understanding of the molecular mechanisms and evolutionary forces driving rearrangements in resistance plasmids may lead to fundamentally new strategies to address the problem of antibiotic resistance.

  19. Financial system loss as an example of high consequence, high frequency events

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1996-07-01

    Much work has been devoted to high consequence events with low frequency of occurrence. Characteristic of these events are bridge failure (such as that of the Tacoma Narrows), building failure (such as the collapse of a walkway at a Kansas City hotel), or compromise of a major chemical containment system (such as at Bhopal, India). Such events, although rare, have an extreme personal, societal, and financial impact. An interesting variation is demonstrated by financial losses due to fraud and abuse in the money management system. The impact can be huge, entailing very high aggregate costs, but these are a result of the contribution of many small attacks and not the result of a single (or few) massive events. Public awareness is raised through publicized events such as the junk bond fraud perpetrated by Milikin or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These event,s although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. This paper explores the magnitude of financial system losses and identifies new areas for analysis of high consequence events including the potential effect of malevolent intent.

  20. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  1. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  2. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  3. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  4. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  5. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  6. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  7. Highly Luminescent Dual Mode Polymeric Nanofiber-Based Flexible Mat for White Security Paper and Encrypted Nanotaggant Applications.

    Science.gov (United States)

    Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar

    2018-05-23

    Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Radiological and dosimetric consequences in case of nuclear accident: taking them into account within the security approach and protection challenges

    International Nuclear Information System (INIS)

    Cogez, E.; Herviou, K.; Isnard, O.; Cessac, B.; Reales, N.; Quentric, E.; Quelo, D.

    2010-01-01

    This report first proposes a presentation of the 'defence in depth' concept which comprises five as much as possible independent levels: preventing operation anomalies and system failures, maintaining the installation within the authorized domain, controlling accidents within design hypotheses, preventing the degradation of accidental conditions and limiting consequences of severe accidents, limiting radiological consequences for population in case of important releases. Then, after a description of a release atmospheric dispersion and of its consequences, this report describes the consequences of two accident scenarios. The first accident is a failure of steam generator tubes, and the second a loss of primary coolant. It notably indicates the main released radionuclides, exposure levels at different distance for a given set of dispersion conditions

  9. CONSIDERATIONS REGARDING THE 21st CENTURY’s HIGH QUALITY SECURITY CONCEPT

    Directory of Open Access Journals (Sweden)

    Eugen SITEANU

    2017-12-01

    Full Text Available The present paper is devoted to qualitative security which today has to become a topic issue of world security. The opinions regarding the 21st century’s security concept are contradictory since people have different understandings and perceptions of security, respectively insecurity, and do not agree to analyze the security concept as a function of the system. Our take is that implementation of some new security concepts should aim an analysis and understanding of security in an integrating view, in order to make the most comprehensive security environment possible. Therefore, we do believe that it is necessary to define the concept of high quality security, which is translated in our current paper.

  10. Quantum secure direct communication with high-dimension quantum superdense coding

    International Nuclear Information System (INIS)

    Wang Chuan; Li Yansong; Liu Xiaoshu; Deng Fuguo; Long Guilu

    2005-01-01

    A protocol for quantum secure direct communication with quantum superdense coding is proposed. It combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding. It has the advantage of being secure and of high source capacity

  11. Vraaggestuurd Programma 2012-2014. Voortgangsrapportage 2013, VP Security, Thema VII High Tech Systemen en Materialen

    NARCIS (Netherlands)

    Don, J.A.

    2014-01-01

    De roadmap Security voor topsector High Tech Systems & Materials wordt gedragen door een breed consortium van bedrijven, overheden, TNO, NLR en STW/NWO (zie www.htsm.nl). Onder regie van het roadmapteam Security is het plan 2013 voor TNO-Vraaggestuurd Onderzoeksprogramma Security 2012-2014 opgesteld

  12. THE IMPORTANCE OF AFFECT TO BUILD CONSUMER TRUST IN HIGH-CONSEQUENCES EXCHANGES

    Directory of Open Access Journals (Sweden)

    Mellina da Silva Terres

    2012-12-01

    Full Text Available The present article investigates the importance of affect displayed by service provider to build consumer trust in high consequence exchanges. High-consequence exchanges are difficult situations in which the choices present a dilemma that can cause stress and severe emotional reactions (KAHN; LUCE, 2003. In this specific case, trust based on affect seems to become important; mainly because consumers may not have ability to evaluate the cognitive aspects of the situation, and moreover, a medical services failure can be highly problematic or even fatal (LEISEN; HYMAN, 2004. On the other hand, in low-consequence choices, we are predicting that cognition will be more important than affect in building trust. In this kind of situation, patients are more self-confident, less sensitive, and don’t perceive a high probability of loss (KUNREUTHER et al., 2002, and therefore focuses more on the rational outcomes.

  13. Awareness of Consequence of High School Students on Loss of Bio-Diversity

    Science.gov (United States)

    Kasot, Nazim; Özbas, Serap

    2015-01-01

    The aim of this study is to assess the egoistic, altruistic and biospheric awareness of the consequence of high school students regarding the loss of bio-diversity, then comparing the results on the basis of some independent variables (gender, class and family income). The research data were collected from 884 ninth and tenth grade high school…

  14. Ultra-high bandwidth quantum secured data transmission

    Science.gov (United States)

    Dynes, James F.; Tam, Winci W.-S.; Plews, Alan; Fröhlich, Bernd; Sharpe, Andrew W.; Lucamarini, Marco; Yuan, Zhiliang; Radig, Christian; Straw, Andrew; Edwards, Tim; Shields, Andrew J.

    2016-10-01

    Quantum key distribution (QKD) provides an attractive means for securing communications in optical fibre networks. However, deployment of the technology has been hampered by the frequent need for dedicated dark fibres to segregate the very weak quantum signals from conventional traffic. Up until now the coexistence of QKD with data has been limited to bandwidths that are orders of magnitude below those commonly employed in fibre optic communication networks. Using an optimised wavelength divisional multiplexing scheme, we transport QKD and the prevalent 100 Gb/s data format in the forward direction over the same fibre for the first time. We show a full quantum encryption system operating with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits of the technology by experimental measurements of the Raman noise, we demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km link. These results suggest it will be possible to integrate QKD and other quantum photonic technologies into high bandwidth data communication infrastructures, thereby allowing their widespread deployment.

  15. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  16. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  17. The risk ogf high-risk jobs : psychological health consequences in forensic physicians and ambulance workers

    NARCIS (Netherlands)

    Ploeg, E. van der

    2003-01-01

    The risk of high-risk jobs: Psychological health consequences in forensic doctors and ambulance workers This thesis has shown that forensic physicians and ambulance personnel frequently suffer from psychological complaints as a result of dramatic events and sources of chronic work stress. A

  18. 49 CFR 192.905 - How does an operator identify a high consequence area?

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.905 How does an operator identify a high consequence area? (a...

  19. Women's Ways of Drinking: College Women, High-Risk Alcohol Use, and Negative Consequences

    Science.gov (United States)

    Smith, Margaret A.; Berger, Joseph B.

    2010-01-01

    The purpose of this study was to explore college women's high-risk alcohol use and related consequences. This study employed a qualitative approach to understand and provide visibility for a gender-related perspective on college women's alcohol experiences and related outcomes. Data were collected from interviews with 10 undergraduate females at a…

  20. Russian gas price reform and the EU-Russia gas relationship: Incentives, consequences and European security of supply

    International Nuclear Information System (INIS)

    Spanjer, Aldo

    2007-01-01

    In order to provide a comprehensive picture on the relationship between Russia and the EU, the focus should be on both the external energy relationship as well as Russia's internal organization. This paper sets out to do this by combining both strands of research in order to arrive at recommendations for Europe on the way to adjust its energy policy towards Russia. The emphasis is on whether or not Russia should impose unified gas pricing. Main conclusions are that the perceived advantages of unified Russian gas pricing to Russia as well as Europe are in fact overstated and that EU security of supply might worsen under unified gas prices. Three policy recommendations are that EU policy should (1) more explicitly acknowledge the interdependence between Russia and Europe; (2) not push Russia towards unified gas pricing; and (3) not take for granted any increase in Russian exports flowing to Europe

  1. Defining the Needs of Patients with Intellectual Disabilities in the High Security Psychiatric Hospitals in England

    Science.gov (United States)

    Thomas, S. D.; Dolan, M.; Johnston, S.; Middleton, H.; Harty, M. A.; Carlisle, J.; Thornicroft, G.; Appleby, L.; Jones, P.

    2004-01-01

    Previous studies have suggested that a substantial proportion of the patients with intellectual disabilities (ID) in the high security psychiatric hospitals (HSPHs) should be transferred to more appropriate services to cater for their specific needs in the longer term. The individual and placement needs of high secure psychiatric patients detained…

  2. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  3. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  4. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  5. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  6. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  7. Does Alcohol Use Mediate the Association between Consequences Experienced in High School and Consequences Experienced during the First Semester of College?

    Science.gov (United States)

    Romosz, Ann Marie; Quigley, Brian M.

    2013-01-01

    Approximately 80% of college students drink alcohol; almost half of these students reporting that they drink to get drunk and over 22% engage in heavy episodic drinking. Heavy alcohol consumption during the transition from high school to college is associated with negative personal and academic consequences. Sixty-seven freshmen volunteered to…

  8. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  9. [The end of discrimination in social security for the elderly? Some remarks on the consequences of the paradigm shift in a life course perspective on gender].

    Science.gov (United States)

    Fachinger, Uwe

    2008-10-01

    woman's life are important factors to combat the disadvantages of private funded pension systems of which mainly women are affected in building up rights to future benefits. The analysis shows that the paradigm shift primarily brings disadvantages to women. They disproportionally depend on statutory pension system benefits, and therefore also on compensating benefits of the negative consequences of private and occupational pension systems. For the future an increase in poverty of older people - and especially women - can be seen to emerge because of pension privatisation and the reduction of the pension level in the German social security system.

  10. Re-assessment of road accident data-analysis policy : applying theory from involuntary, high-consequence, low-probability events like nuclear power plant meltdowns to voluntary, low-consequence, high-probability events like traffic accidents

    Science.gov (United States)

    2002-02-01

    This report examines the literature on involuntary, high-consequence, low-probability (IHL) events like nuclear power plant meltdowns to determine what can be applied to the problem of voluntary, low-consequence high-probability (VLH) events like tra...

  11. Systems engineering applied to integrated safety management for high consequence facilities

    International Nuclear Information System (INIS)

    Barter, R; Morais, B.

    1998-01-01

    Integrated Safety Management is a concept that is being actively promoted by the U.S. Department of Energy as a means of assuring safe operation of its facilities. The concept involves the integration of safety precepts into work planning rather than adjusting for safe operations after defining the work activity. The system engineering techniques used to design an integrated safety management system for a high consequence research facility are described. An example is given to show how the concepts evolved with the system design

  12. Statistical surrogate models for prediction of high-consequence climate change.

    Energy Technology Data Exchange (ETDEWEB)

    Constantine, Paul; Field, Richard V., Jr.; Boslough, Mark Bruce Elrick

    2011-09-01

    In safety engineering, performance metrics are defined using probabilistic risk assessments focused on the low-probability, high-consequence tail of the distribution of possible events, as opposed to best estimates based on central tendencies. We frame the climate change problem and its associated risks in a similar manner. To properly explore the tails of the distribution requires extensive sampling, which is not possible with existing coupled atmospheric models due to the high computational cost of each simulation. We therefore propose the use of specialized statistical surrogate models (SSMs) for the purpose of exploring the probability law of various climate variables of interest. A SSM is different than a deterministic surrogate model in that it represents each climate variable of interest as a space/time random field. The SSM can be calibrated to available spatial and temporal data from existing climate databases, e.g., the Program for Climate Model Diagnosis and Intercomparison (PCMDI), or to a collection of outputs from a General Circulation Model (GCM), e.g., the Community Earth System Model (CESM) and its predecessors. Because of its reduced size and complexity, the realization of a large number of independent model outputs from a SSM becomes computationally straightforward, so that quantifying the risk associated with low-probability, high-consequence climate events becomes feasible. A Bayesian framework is developed to provide quantitative measures of confidence, via Bayesian credible intervals, in the use of the proposed approach to assess these risks.

  13. Global situational awareness and early warning of high-consequence climate change.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Carr, Martin J.; Boslough, Mark Bruce Elrick

    2009-08-01

    Global monitoring systems that have high spatial and temporal resolution, with long observational baselines, are needed to provide situational awareness of the Earth's climate system. Continuous monitoring is required for early warning of high-consequence climate change and to help anticipate and minimize the threat. Global climate has changed abruptly in the past and will almost certainly do so again, even in the absence of anthropogenic interference. It is possible that the Earth's climate could change dramatically and suddenly within a few years. An unexpected loss of climate stability would be equivalent to the failure of an engineered system on a grand scale, and would affect billions of people by causing agricultural, economic, and environmental collapses that would cascade throughout the world. The probability of such an abrupt change happening in the near future may be small, but it is nonzero. Because the consequences would be catastrophic, we argue that the problem should be treated with science-informed engineering conservatism, which focuses on various ways a system can fail and emphasizes inspection and early detection. Such an approach will require high-fidelity continuous global monitoring, informed by scientific modeling.

  14. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    Science.gov (United States)

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  15. Enabling Secure, Scalable Microgrids with High Penetration Renewables

    Energy Technology Data Exchange (ETDEWEB)

    Wasynczuk, Oleg [Purdue Univ., West Lafayette, IN (United States). School of Electrical and Computer Engineering; Rashkin, Lee Joshua [Purdue Univ., West Lafayette, IN (United States). School of Electrical and Computer Engineering; Pekarek, Steven D. [Purdue Univ., West Lafayette, IN (United States). School of Electrical and Computer Engineering

    2013-09-01

    In the first section, ac and dc technologies are compared highlighting their advantages and disadvantages. Since ac and dc systems have both evolved significantly since their introduction in the mid and latter parts of the 19th century, many of the early advantages of ac systems no longer exist or are of less importance today. Consequently, it is useful to provide a brief historical perspective on the evolution of both ac and dc power systems. As in the dc case, there are many potential modes of operation and control strategies for the given system. In ac systems, the situation is more complex since it is necessary to regulate both the amplitude and the frequency of the ac voltage. In the third section, the techniques of controlling and analyzing the stability of ac systems is reviewed.

  16. The external costs of low probability-high consequence events: Ex ante damages and lay risks

    International Nuclear Information System (INIS)

    Krupnick, A.J.; Markandya, A.; Nickell, E.

    1994-01-01

    This paper provides an analytical basis for characterizing key differences between two perspectives on how to estimate the expected damages of low probability - high consequence events. One perspective is the conventional method used in the U.S.-EC fuel cycle reports [e.g., ORNL/RFF (1994a,b]. This paper articulates another perspective, using economic theory. The paper makes a strong case for considering this, approach as an alternative, or at least as a complement, to the conventional approach. This alternative approach is an important area for future research. I Interest has been growing worldwide in embedding the external costs of productive activities, particularly the fuel cycles resulting in electricity generation, into prices. In any attempt to internalize these costs, one must take into account explicitly the remote but real possibilities of accidents and the wide gap between lay perceptions and expert assessments of such risks. In our fuel cycle analyses, we estimate damages and benefits' by simply monetizing expected consequences, based on pollution dispersion models, exposure-response functions, and valuation functions. For accidents, such as mining and transportation accidents, natural gas pipeline accidents, and oil barge accidents, we use historical data to estimate the rates of these accidents. For extremely severe accidents--such as severe nuclear reactor accidents and catastrophic oil tanker spills--events are extremely rare and they do not offer a sufficient sample size to estimate their probabilities based on past occurrences. In those cases the conventional approach is to rely on expert judgments about both the probability of the consequences and their magnitude. As an example of standard practice, which we term here an expert expected damage (EED) approach to estimating damages, consider how evacuation costs are estimated in the nuclear fuel cycle report

  17. The external costs of low probability-high consequence events: Ex ante damages and lay risks

    Energy Technology Data Exchange (ETDEWEB)

    Krupnick, A J; Markandya, A; Nickell, E

    1994-07-01

    This paper provides an analytical basis for characterizing key differences between two perspectives on how to estimate the expected damages of low probability - high consequence events. One perspective is the conventional method used in the U.S.-EC fuel cycle reports [e.g., ORNL/RFF (1994a,b]. This paper articulates another perspective, using economic theory. The paper makes a strong case for considering this, approach as an alternative, or at least as a complement, to the conventional approach. This alternative approach is an important area for future research. I Interest has been growing worldwide in embedding the external costs of productive activities, particularly the fuel cycles resulting in electricity generation, into prices. In any attempt to internalize these costs, one must take into account explicitly the remote but real possibilities of accidents and the wide gap between lay perceptions and expert assessments of such risks. In our fuel cycle analyses, we estimate damages and benefits' by simply monetizing expected consequences, based on pollution dispersion models, exposure-response functions, and valuation functions. For accidents, such as mining and transportation accidents, natural gas pipeline accidents, and oil barge accidents, we use historical data to estimate the rates of these accidents. For extremely severe accidents--such as severe nuclear reactor accidents and catastrophic oil tanker spills--events are extremely rare and they do not offer a sufficient sample size to estimate their probabilities based on past occurrences. In those cases the conventional approach is to rely on expert judgments about both the probability of the consequences and their magnitude. As an example of standard practice, which we term here an expert expected damage (EED) approach to estimating damages, consider how evacuation costs are estimated in the nuclear fuel cycle report.

  18. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  19. Consequences of long-term power outages and high electricity prices lasting for months

    International Nuclear Information System (INIS)

    2005-01-01

    Several areas in the world have experienced electricity outages for longer periods of time, but the consequences of these are sparsely documented. There is a need for further analysis of the socioeconomic consequences of the outages. In addition to KILE (Quality adjusted revenue framework for un supplied energy) costs one has to take into account that the costs often increase proportionally with the durance of the outage, and that KILE tariffs do not reflect lost consumer's surplus for products that are not produced during an outage. A good example is the public underground transport, where the company's economical loss can be significantly smaller than the loss of utility value for the travellers. If the authorities act with reasonability it is difficult to see that periods with very high prices represent a big problem. The most important problems are related to diffused effects, especially for households with a weak economy. These problems can be solved with improved contractual forms (price guarantees) or by transfers to the households, without weakening the incentives for electricity economising (ml)

  20. The positive bystander effect: passive bystanders increase helping in situations with high expected negative consequences for the helper.

    Science.gov (United States)

    Fischer, Peter; Greitemeyer, Tobias

    2013-01-01

    The present field study investigated the interplay between the presence of a passive bystander (not present versus present) in a simulated bike theft and expected negative consequences (low versus high) in predicting intervention behavior when no physical victim is present. It was found that an additional bystander increases individual intervention in situations where the expected negative consequences for the helper in case of intervention were high (i.e., when the bike thief looks fierce) compared to situations where the expected negative consequences for the helper were low (i.e., when the bike thief does not look fierce). In contrast, no such effect for high vs. low expected negative consequences was observed when no additional bystander observed the critical situation. The results are discussed in light of previous laboratory findings on expected negative consequences and bystander intervention.

  1. Key drivers and economic consequences of high-end climate scenarios: uncertainties and risks

    DEFF Research Database (Denmark)

    Halsnæs, Kirsten; Kaspersen, Per Skougaard; Drews, Martin

    2015-01-01

    The consequences of high-end climate scenarios and the risks of extreme events involve a number of critical assumptions and methodological challenges related to key uncertainties in climate scenarios and modelling, impact analysis, and economics. A methodological framework for integrated analysis...... of extreme events increase beyond scaling, and in combination with economic assumptions we find a very wide range of risk estimates for urban precipitation events. A sensitivity analysis addresses 32 combinations of climate scenarios, damage cost curve approaches, and economic assumptions, including risk...... aversion and equity represented by discount rates. Major impacts of alternative assumptions are investigated. As a result, this study demonstrates that in terms of decision making the actual expectations concerning future climate scenarios and the economic assumptions applied are very important...

  2. Risk management & organizational uncertainty implications for the assessment of high consequence organizations

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, C.T.

    1995-02-23

    Post hoc analyses have demonstrated clearly that macro-system, organizational processes have played important roles in such major catastrophes as Three Mile Island, Bhopal, Exxon Valdez, Chernobyl, and Piper Alpha. How can managers of such high-consequence organizations as nuclear power plants and nuclear explosives handling facilities be sure that similar macro-system processes are not operating in their plants? To date, macro-system effects have not been integrated into risk assessments. Part of the reason for not using macro-system analyses to assess risk may be the impression that standard organizational measurement tools do not provide hard data that can be managed effectively. In this paper, I argue that organizational dimensions, like those in ISO 9000, can be quantified and integrated into standard risk assessments.

  3. Security of bottle to fill in a high pressure air

    Science.gov (United States)

    Todic, M.; Latinovic, T.; Golubovic-Bugarski, V.; Majstorovic, A.

    2018-01-01

    Charging the bottle of high pressure air isolation devices is performed by a high-pressure compressor. The charging time is in function of the compressor capacity and the intensity of the nominal pressure of the air in the bottle. However, in accident situations this time is long and therefore high-pressure accumulators are used where the filling time of the bottle of isolation apparatus has been drastically reduced. Due to the short filling time of the bottle through the air flow, there is a thermodynamic load of bottle material that could endanger the safety of users and other participants in the area. It is therefore necessary to determine the critical parameters of the rapid charge and their intensity.

  4. Leadership in organizations with high security and reliability requirements

    International Nuclear Information System (INIS)

    Gonzalez, F.

    2013-01-01

    Developing leadership skills in organizations is the key to ensure the sustainability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  5. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

    Directory of Open Access Journals (Sweden)

    A. Yesu Raj

    2015-12-01

    Full Text Available Data security is the very important part in the network data communication. Avoidance of the information hacking and steeling are very challenging part for network data communication. Now-a-days people are using many encryption and decryption techniques for data security. But all encryption and decryption techniques are having more time occupation or less security for the process. This paper proposed high level security approach to encryption and decryption for data security. Two levels of securities are used in this proposed method. First one is data encryption and the second one is hash value generation. The proposed Weaving based Superior Encryption Standard (WSES uses a novel weaving based approach. The weaving array generation is done by Elementary Number Theory Notation (ENTN method. The weaving array has multiple private keys for XOR encryption. After encryption the error value is extracted from the encrypted array and weaving array. This error value is sent to the other side. The novel approach for hash value generation uses the encrypted array. After encryption, the encrypted array is rotated into four degrees and each degree data are converted to vector format and arranged on by one under the vector. Finally a 2D Rotational Encryption Matrix (REM is obtained. After this process a REM copy is converted to mirror flip and it is need as Flipped Matrix (FM. The FM is concatenated under the REM and converted to vector using the zigzag operation. Finally this process gives two bytes hash value from the vector. This proposed method executes very fast and provide high security. This method is much reliable to small size applications and also used for any type of data security.

  6. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas

    International Nuclear Information System (INIS)

    2001-01-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  7. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  8. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  9. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  10. Development of national standards related to the integrated safety and security of high-rise buildings

    Science.gov (United States)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  11. Development of national standards related to the integrated safety and security of high-rise buildings

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  12. Lessons from the domestic Ebola response: Improving health care system resilience to high consequence infectious diseases.

    Science.gov (United States)

    Meyer, Diane; Kirk Sell, Tara; Schoch-Spana, Monica; Shearer, Matthew P; Chandler, Hannah; Thomas, Erin; Rose, Dale A; Carbone, Eric G; Toner, Eric

    2018-05-01

    The domestic response to the West Africa Ebola virus disease (EVD) epidemic from 2014-2016 provides a unique opportunity to distill lessons learned about health sector planning and operations from those individuals directly involved. This research project aimed to identify and integrate these lessons into an actionable checklist that can improve health sector resilience to future high-consequence infectious disease (HCID) events. Interviews (N = 73) were completed with individuals involved in the domestic EVD response in 4 cities (Atlanta, Dallas, New York, and Omaha), and included individuals who worked in academia, emergency management, government, health care, law, media, and public health during the response. Interviews were transcribed and analyzed qualitatively. Two focus groups were then conducted to expand on themes identified in the interviews. Using these themes, an evidence-informed checklist was developed and vetted for completeness and feasibility by an expert advisory group. Salient themes identified included health care facility issues-specifically identifying assessment and treatment hospitals, isolation and treatment unit layout, waste management, community relations, patient identification, patient isolation, limitations on treatment, laboratories, and research considerations-and health care workforce issues-specifically psychosocial impact, unit staffing, staff training, and proper personal protective equipment. The experiences of those involved in the domestic Ebola response provide critical lessons that can help strengthen resilience of health care systems and improve future responses to HCID events. Copyright © 2018 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.

  13. The renal consequences of maternal obesity in offspring are overwhelmed by postnatal high fat diet

    Science.gov (United States)

    Glastras, Sarah J.; Chen, Hui; Tsang, Michael; Teh, Rachel; McGrath, Rachel T.; Zaky, Amgad; Chen, Jason; Wong, Muh Geot; Pollock, Carol A.; Saad, Sonia

    2017-01-01

    Aims/Hypothesis Developmental programming induced by maternal obesity influences the development of chronic disease in offspring. In the present study, we aimed to determine whether maternal obesity exaggerates obesity-related kidney disease. Methods Female C57BL/6 mice were fed high-fat diet (HFD) for six weeks prior to mating, during gestation and lactation. Male offspring were weaned to normal chow or HFD. At postnatal Week 8, HFD-fed offspring were administered one dose streptozotocin (STZ, 100 mg/kg i.p.) or vehicle control. Metabolic parameters and renal functional and structural changes were observed at postnatal Week 32. Results HFD-fed offspring had increased adiposity, glucose intolerance and hyperlipidaemia, associated with increased albuminuria and serum creatinine levels. Their kidneys displayed structural changes with increased levels of fibrotic, inflammatory and oxidative stress markers. STZ administration did not potentiate the renal effects of HFD. Though maternal obesity had a sustained effect on serum creatinine and oxidative stress markers in lean offspring, the renal consequences of maternal obesity were overwhelmed by the powerful effect of diet-induced obesity. Conclusion Maternal obesity portends significant risks for metabolic and renal health in adult offspring. However, diet-induced obesity is an overwhelming and potent stimulus for the development of CKD that is not potentiated by maternal obesity. PMID:28225809

  14. High-intensity interval exercise and cerebrovascular health: curiosity, cause, and consequence.

    Science.gov (United States)

    Lucas, Samuel J E; Cotter, James D; Brassard, Patrice; Bailey, Damian M

    2015-06-01

    Exercise is a uniquely effective and pluripotent medicine against several noncommunicable diseases of westernised lifestyles, including protection against neurodegenerative disorders. High-intensity interval exercise training (HIT) is emerging as an effective alternative to current health-related exercise guidelines. Compared with traditional moderate-intensity continuous exercise training, HIT confers equivalent if not indeed superior metabolic, cardiac, and systemic vascular adaptation. Consequently, HIT is being promoted as a more time-efficient and practical approach to optimize health thereby reducing the burden of disease associated with physical inactivity. However, no studies to date have examined the impact of HIT on the cerebrovasculature and corresponding implications for cognitive function. This review critiques the implications of HIT for cerebrovascular function, with a focus on the mechanisms and translational impact for patient health and well-being. It also introduces similarly novel interventions currently under investigation as alternative means of accelerating exercise-induced cerebrovascular adaptation. We highlight a need for studies of the mechanisms and thereby also the optimal dose-response strategies to guide exercise prescription, and for studies to explore alternative approaches to optimize exercise outcomes in brain-related health and disease prevention. From a clinical perspective, interventions that selectively target the aging brain have the potential to prevent stroke and associated neurovascular diseases.

  15. The renal consequences of maternal obesity in offspring are overwhelmed by postnatal high fat diet.

    Directory of Open Access Journals (Sweden)

    Sarah J Glastras

    Full Text Available Developmental programming induced by maternal obesity influences the development of chronic disease in offspring. In the present study, we aimed to determine whether maternal obesity exaggerates obesity-related kidney disease.Female C57BL/6 mice were fed high-fat diet (HFD for six weeks prior to mating, during gestation and lactation. Male offspring were weaned to normal chow or HFD. At postnatal Week 8, HFD-fed offspring were administered one dose streptozotocin (STZ, 100 mg/kg i.p. or vehicle control. Metabolic parameters and renal functional and structural changes were observed at postnatal Week 32.HFD-fed offspring had increased adiposity, glucose intolerance and hyperlipidaemia, associated with increased albuminuria and serum creatinine levels. Their kidneys displayed structural changes with increased levels of fibrotic, inflammatory and oxidative stress markers. STZ administration did not potentiate the renal effects of HFD. Though maternal obesity had a sustained effect on serum creatinine and oxidative stress markers in lean offspring, the renal consequences of maternal obesity were overwhelmed by the powerful effect of diet-induced obesity.Maternal obesity portends significant risks for metabolic and renal health in adult offspring. However, diet-induced obesity is an overwhelming and potent stimulus for the development of CKD that is not potentiated by maternal obesity.

  16. Back pain and its consequences among Polish Air Force pilots flying high performance aircraft

    Directory of Open Access Journals (Sweden)

    Aleksandra Truszczyńska

    2014-04-01

    Full Text Available Objectives: Back pain in Air Force fast jet pilots has been studied by several air forces and found to be relatively common. The objective of the study was to determine the prevalence and degree of the pain intensity in the cervical, thoracic and lumbar spine, subjective risk factors and their effect on the pilots' performance while flying high maneuver aircrafts and the consequences for cognitive deficiencies. Material and Methods: The study was designed as a retrospective, anonymous questionnaire survey, collecting data on the age, aircraft type, flying hours, pain characteristics, physical activity, etc. The study was participated by 94 pilots aged 28-45 years (mean age: 35.9±3.3 years, actively flying fast jet aircrafts Su-22, Mig-29 and F-16. The estimates regarding the level of the subjective back pain were established using visual analogue scales (VAS. Results: The values of the Cochran and Cox T-test for heterogeneous variances are as follows: for the total number of flying hours: F = 2.53, p = 0.0145, for the pilot's age: F = 3.15, p = 0.003, and for the BMI factor F = 2.73, p = 0.008. Conclusions: Our questionnaire survey showed a significant problem regarding spinal conditions in high performance aircraft pilots. The determination of the risk factors may lead to solving this problem and help eliminate the effect of the unfavorable environment on piloting jet aircrafts. Experiencing back pain during the flight might influence the mission performance and flight safety. The costs of pilots education are enormous and inability to fly, or even disability, leads to considerable economic loss. More research on specific prevention strategies is warranted in order to improve the in-flight working environment of fighter pilots.

  17. Future consequences of decreasing marginal production efficiency in the high-yielding dairy cow.

    Science.gov (United States)

    Moallem, U

    2016-04-01

    The objectives were to examine the gross and marginal production efficiencies in high-yielding dairy cows and the future consequences on dairy industry profitability. Data from 2 experiments were used in across-treatments analysis (n=82 mid-lactation multiparous Israeli-Holstein dairy cows). Milk yields, body weights (BW), and dry matter intakes (DMI) were recorded daily. In both experiments, cows were fed a diet containing 16.5 to 16.6% crude protein and net energy for lactation (NEL) at 1.61 Mcal/kg of dry matter (DM). The means of milk yield, BW, DMI, NEL intake, and energy required for maintenance were calculated individually over the whole study, and used to calculate gross and marginal efficiencies. Data were analyzed in 2 ways: (1) simple correlation between variables; and (2) cows were divided into 3 subgroups, designated low, moderate, and high DMI (LDMI, MDMI, and HDMI), according to actual DMI per day: ≤ 26 kg (n=27); >26 through 28.2 kg (n=28); and >28.2 kg (n=27). The phenotypic Pearson correlations among variables were analyzed, and the GLM procedure was used to test differences between subgroups. The relationships between milk and fat-corrected milk yields and the corresponding gross efficiencies were positive, whereas BW and gross production efficiency were negatively correlated. The marginal production efficiency from DM and energy consumed decreased with increasing DMI. The difference between BW gain as predicted by the National Research Council model (2001) and the present measurements increased with increasing DMI (r=0.68). The average calculated energy balances were 1.38, 2.28, and 4.20 Mcal/d (standard error of the mean=0.64) in the LDMI, MDMI, and HDMI groups, respectively. The marginal efficiency for milk yields from DMI or energy consumed was highest in LDMI, intermediate in MDMI, and lowest in HDMI. The predicted BW gains for the whole study period were 22.9, 37.9, and 75.8 kg for the LDMI, MDMI, and HDMI groups, respectively. The

  18. Design of High-Security USB Flash Drives Based on Chaos Authentication

    Directory of Open Access Journals (Sweden)

    Teh-Lu Liao

    2018-05-01

    Full Text Available This paper aims to propose a novel design of high-security USB flash drives with the chaos authentication. A chaos authentication approach with the non-linear encryption and decryption function design is newly proposed and realized based on the controller design of chaos synchronization. To complete the design of high-security USB flash drives, first, we introduce six parameters into the original Henon map to adjust and obtain richer chaotic state responses. Then a discrete sliding mode scheme is proposed to solve the synchronization problem of discrete hyperchaotic Henon maps. The proposed sliding mode controller can ensure the synchronization of the master-slave Henon maps. The selection of the switching surface and the existence of the sliding motion are also addressed. Finally, the obtained results are applied to design a new high-security USB flash drive with chaos authentication. We built discrete hyperchaotic Henon maps in the smartphone (master and microcontroller (slave, respectively. The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both the USB flash drive and smartphone, and pass the chaos authentication. When users need to access data in the flash drive, they can easily enable the encryption APP in the smartphone (master for chaos authentication. After completing the chaos synchronization and authentication, the ARM-based microcontroller allows the computer to access the data in the high-security USB flash drive.

  19. High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Luo-Ming, Meng; Fu-Chen, Zhu

    2009-01-01

    Two efficient protocols of quantum secure direct communication with authentication [Chin. Phys. Lett. 25 (2008) 2354] were recently proposed by Liu et al. to improve the efficiency of two protocols presented in [Phys. Rev. A 75 (2007) 026301] by four Pauli operations. We show that the high efficiency of the two protocols is at the expense of their security. The authenticator Trent can reach half the secret by a particular attack strategy in the first protocol. In the second protocol, not only Trent but also an eavesdropper outside can elicit half-information about the secret from the public declaration

  20. Risk-averse decision-making for civil infrastructure exposed to low-probability, high-consequence events

    International Nuclear Information System (INIS)

    Cha, Eun Jeong; Ellingwood, Bruce R.

    2012-01-01

    Quantitative analysis and assessment of risk to civil infrastructure has two components: probability of a potentially damaging event and consequence of damage, measured in terms of financial or human losses. Decision models that have been utilized during the past three decades take into account the probabilistic component rationally, but address decision-maker attitudes toward consequences and risk only to a limited degree. The application of models reflecting these attitudes to decisions involving low-probability, high-consequence events that may impact civil infrastructure requires a fundamental understanding of risk acceptance attitudes and how they affect individual and group choices. In particular, the phenomenon of risk aversion may be a significant factor in decisions for civil infrastructure exposed to low-probability events with severe consequences, such as earthquakes, hurricanes or floods. This paper utilizes cumulative prospect theory to investigate the role and characteristics of risk-aversion in assurance of structural safety.

  1. Security Notice To Federal, State and Local Officials Receiving Access to the Risk Management Program’s Off-site Consequence Analysis Information

    Science.gov (United States)

    Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.

  2. High-Performing Families: Causes, Consequences, and Clinical Solutions. The Family Psychology and Counseling Series.

    Science.gov (United States)

    Robinson, Bryan E., Ed.; Chase, Nancy D., Ed.

    This book explores the dilemma of the increasing obsession with work and the resulting imbalances between career and family life. Through theoretical frameworks and case examples it discusses the negative consequences of the societal phenomena of over-work and over-dedication to careers, which have been misdiagnosed or ignored by mental health…

  3. Perceived Sexual Benefits of Alcohol Use among Recent High School Graduates: Longitudinal Associations with Drinking Behavior and Consequences

    Science.gov (United States)

    Brady, Sonya S.; Wilkerson, J. Michael; Jones-Webb, Rhonda

    2012-01-01

    In this research study of 153 college-bound students, perceived sexual benefits of alcohol use were associated with greater drinking and related consequences during the senior year of high school and freshman year of college. Perceived benefits predicted drinking outcomes during fall after adjustment for gender, sensation seeking, parental…

  4. Development of risk assessment simulation tool for optimal control of a low probability-high consequence disaster

    International Nuclear Information System (INIS)

    Yotsumoto, Hiroki; Yoshida, Kikuo; Genchi, Hiroshi

    2011-01-01

    In order to control low probability-high consequence disaster which causes huge social and economic damage, it is necessary to develop simultaneous risk assessment simulation tool based on the scheme of disaster risk including diverse effects of primary disaster and secondary damages. We propose the scheme of this risk simulation tool. (author)

  5. Transformations, transport, and potential unintended consequences of high sulfur inputs to Napa Valley vineyards

    OpenAIRE

    Hinckley, Eve-Lyn S.; Matson, Pamela A.

    2011-01-01

    Unintended anthropogenic deposition of sulfur (S) to forest ecosystems has a range of negative consequences, identified through decades of research. There has been far less study of purposeful S use in agricultural systems around the world, including the application of elemental sulfur (S0) as a quick-reacting fungicide to prevent damage to crops. Here we report results from a three-year study of the transformations and flows of applied S0 in soils, vegetation, and hydrologic export pathways ...

  6. Synchronization and secure communication of chaotic systems via robust adaptive high-gain fuzzy observer

    International Nuclear Information System (INIS)

    Hyun, Chang-Ho; Park, Chang-Woo; Kim, Jae-Hun; Park, Mignon

    2009-01-01

    This paper proposes an alternative robust adaptive high-gain fuzzy observer design scheme and its application to synchronization and secure communication of chaotic systems. It is assumed that their states are immeasurable and their parameters are unknown. The structure of the proposed observer is represented by Takagi-Sugeno fuzzy model and has the integrator of the estimation error. It improves the performance of high-gain observer and makes the proposed observer robust against noisy measurements, uncertainties and parameter perturbations as well. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed observer is analyzed. Some simulation result of synchronization and secure communication of chaotic systems is given to present the validity of theoretical derivations and the performance of the proposed observer as an application.

  7. Looking back, looking forward: Recovery journeys in a high secure hospital.

    Science.gov (United States)

    McKeown, Mick; Jones, Fiona; Foy, Paul; Wright, Karen; Paxton, Tracey; Blackmon, Mike

    2016-06-01

    A qualitative study of staff and service users' views of recovery was undertaken in a UK high secure hospital working to implement recovery practices. 30 staff and 25 service users participated in semi-structured interviews or focus groups. Thematic analysis identified four broad accounts of how recovery was made sense of in the high secure environment: the importance of meaningful occupation; valuing relationships; recovery journeys and dialogue with the past; and recovery as personal responsibility. These themes are discussed with an emphasis on service user strategies of cooperation or resistance, respectively advancing or impeding progress through the system. In this context the notion of cooperation is, for many, commensurate with compliance with a dominant medical model. The policy framing of recovery opens up contemplation of treatment alternatives, more participatory approaches to risk management, and emphasise the value of relational skills, but may not elude the overarching bio-psychiatric episteme. © 2016 Australian College of Mental Health Nurses Inc.

  8. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    OpenAIRE

    Karolina Pawlak

    2016-01-01

    The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO), the Statistical Office of the European Union (Eurostat), the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD), World Food Programme (WFP) and selected measures used...

  9. Delivering high-level food industry skills for future food security through Advanced Training Partnerships

    OpenAIRE

    Frazier, Richard A.

    2013-01-01

    The UK Biotechnology and Biological Sciences Research Council’s Advanced Training Partnerships initiative represents a significant investment in the provision of high-level skills for the UK food industry sector to address global food security from farm to fork. This paper summarises the background, aims and scope of the Advanced Training Partnerships, their development so far, and offers a view on future directions and evaluation of impact.

  10. Secure data storage by three-dimensional absorbers in highly scattering volume medium

    International Nuclear Information System (INIS)

    Matoba, Osamu; Matsuki, Shinichiro; Nitta, Kouichi

    2008-01-01

    A novel data storage in a volume medium with highly scattering coefficient is proposed for data security application. Three-dimensional absorbers are used as data. These absorbers can not be measured by interferometer when the scattering in a volume medium is strong enough. We present a method to reconstruct three-dimensional absorbers and present numerical results to show the effectiveness of the proposed data storage.

  11. Household food security status and associated factors among high-school students in Esfahan, Iran.

    Science.gov (United States)

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  12. Midterm prospective evaluation of TVT-Secur reveals high failure rate.

    Science.gov (United States)

    Cornu, Jean-Nicolas; Sèbe, Philippe; Peyrat, Laurence; Ciofu, Calin; Cussenot, Olivier; Haab, Francois

    2010-07-01

    TVT-Secur has been described as a new minimally invasive sling for women's stress urinary incontinence (SUI) management, showing promising results in short-term studies. Our goal was to evaluate the outcome of this procedure after a midterm follow-up. A prospective evaluation involved 45 consecutive patients presenting SUI associated with urethral hypermobility. Fourteen patients preoperatively reported overactive bladder (OAB) symptoms, but none had objective detrusor overactivity. Eight patients had low maximal urethral closure pressure (MUCP). Four patients had pelvic organ prolapse (POP). Patients with POP were treated under general anesthesia by Prolift and TVT-Secur procedure. The 41 other patients received TVT-Secur under local anesthesia on an outpatient basis. All interventions were made by the same surgeon. Postoperative assessment included pad count, bladder diary, clinical examination with stress test, evaluation of satisfaction with the Patient Global Impression of Improvement (PGI-I) scale, and evaluation of side effects. Patients were classified as cured if they used no pads, had no leakage, and had a PGI-I score 50% and PGI-I score TVT or transobturator tape during follow-up. Age, MUCP, or OAB were not associated with failure. Side effects were limited to five cases of de novo OAB and three cases of urinary tract infection. This work is limited by the absence of a comparison group. Our experience shows that despite its good short-term efficacy, TVT-Secur is associated with a high recurrence rate of SUI. Therefore, TVT-Secur does not seem appropriate for SUI first-line management in women. Copyright 2010 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  13. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  16. The blues broaden, but the nasty narrows: attentional consequences of negative affects low and high in motivational intensity.

    Science.gov (United States)

    Gable, Philip; Harmon-Jones, Eddie

    2010-02-01

    Positive and negative affects high in motivational intensity cause a narrowing of attentional focus. In contrast, positive affects low in motivational intensity cause a broadening of attentional focus. The attentional consequences of negative affects low in motivational intensity have not been experimentally investigated. Experiment 1 compared the attentional consequences of negative affect low in motivational intensity (sadness) relative to a neutral affective state. Results indicated that low-motivation negative affect caused attentional broadening. Experiment 2 found that disgust, a high-motivation negative affect not previously investigated in attentional studies, narrowed attentional focus. These experiments support the conceptual model linking high-motivation affective states to narrowed attention and low-motivation affective states to broadened attention.

  17. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  18. Transformations, transport, and potential unintended consequences of high sulfur inputs to Napa Valley vineyards.

    Science.gov (United States)

    Hinckley, Eve-Lyn S; Matson, Pamela A

    2011-08-23

    Unintended anthropogenic deposition of sulfur (S) to forest ecosystems has a range of negative consequences, identified through decades of research. There has been far less study of purposeful S use in agricultural systems around the world, including the application of elemental sulfur (S(0)) as a quick-reacting fungicide to prevent damage to crops. Here we report results from a three-year study of the transformations and flows of applied S(0) in soils, vegetation, and hydrologic export pathways of Napa Valley, CA vineyards, documenting that all applied S is lost from the vineyard ecosystem on an annual basis. We found that S(0) oxidizes rapidly to sulfate ( ) on the soil surface where it then accumulates over the course of the growing season. Leaf and grape tissues accounted for only 7-13% of applied S whereas dormant season cover crops accounted for 4-10% of applications. Soil S inventories were largely and ester-bonded sulfates; they decreased from 1,623 ± 354 kg ha(-1) during the dry growing season to 981 ± 526 kg ha(-1) (0-0.5 m) during the dormant wet season. Nearly all S applied to the vineyard soils is transported offsite in dissolved oxidized forms during dormant season rainstorms. Thus, the residence time of reactive S is brief in these systems, and largely driven by hydrology. Our results provide new insight into how S use in vineyards constitutes a substantial perturbation of the S cycle in Northern California winegrowing regions and points to the unintended consequences that agricultural S use may have at larger scales.

  19. Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES.

    Science.gov (United States)

    Adeshina, A M; Hashim, R

    2017-03-01

    Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare procedures have immensely benefitted from the contemporary information technology revolutions, apparently revolutionizing those approaches to acquiring, storing and sharing of diagnostic data for efficient and timely diagnosis of diseases. Connected health network was introduced as an alternative to the ageing traditional concept in healthcare system, improving hospital-physician connectivity and clinical collaborations. Undoubtedly, the modern medicinal approach has drastically improved healthcare but at the expense of high computational cost and possible breach of diagnosis privacy. Consequently, a number of cryptographical techniques are recently being applied to clinical applications, but the challenges of not being able to successfully encrypt both the image and the textual data persist. Furthermore, processing time of encryption-decryption of medical datasets, within a considerable lower computational cost without jeopardizing the required security strength of the encryption algorithm, still remains as an outstanding issue. This study proposes a secured radiology-diagnostic data framework for connected health network using high-performance GPU-accelerated Advanced Encryption Standard. The study was evaluated with radiology image datasets consisting of brain MR and CT datasets obtained from the department of Surgery, University of North Carolina, USA, and the Swedish National Infrastructure for Computing. Sample patients' notes from the University of North Carolina, School of medicine at Chapel Hill were also used to evaluate the framework for its strength in encrypting-decrypting textual data in the form of medical report. Significantly, the framework is not only able to accurately encrypt and decrypt medical image datasets, but it also

  20. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Karolina Pawlak

    2016-06-01

    Full Text Available The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO, the Statistical Office of the European Union (Eurostat, the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD, World Food Programme (WFP and selected measures used by the Economist Intelligence Unit (EIU for the construction of the Global Food Security Index. It has been showed that to the greatest extent the problem of maintaining food security occur in developing countries which are characterised by low per capita income, while in developed countries the scale of hunger is marginal and it afflicts less than 1% of the population. On a regional scale the daily dietary energy supply is greater than the minimum dietary energy requirement in all regions of the world, but the extent to which the dietary needs are satisfied increases along with the increase in national income. In order to reduce the problem of hunger it is necessary to solve the problem of asymmetrical distribution of global income, e.g. by taking actions to accelerate the economic growth in less developed regions and increase the purchasing power of the population.

  1. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  2. CAUSES AND CONSEQUENCES OF THE SCHOOL IN HIGH SCHOOL DROPOUT: CASE UNIVERSIDAD AUTÓNOMA DE SINALOA

    Directory of Open Access Journals (Sweden)

    Rosalva Ruiz-Ramírez

    2014-07-01

    Full Text Available The present investigation has the objective to establish the personal, economic and social causes and consequences that create school desertion of high school in Universidad Autónoma de Sinaloa (UAS. The investigation took place in the high school located in the municipality of El Fuerte, Sinaloa, in the academic unit (UA of San Blas and its extensions The Constancia and The Higueras of the Natoches in 2013. A mixed approach was used to analyze qualitative and quantitative information; the studied population was 18 women and 17 men deserters of the school cycle 2011-2012, ten teachers, four directors and twenty non-deserting students. In the results one can see that the principal factor for school desertion was the personnel to be married and not approving classes. The main consequence was economic, highlighting that the poverty cycle is hard to break.

  3. The Consequences of Commercialization Choices for New Entrants in High-Tech Industries: A Venture Emergence Perspective

    DEFF Research Database (Denmark)

    Giones, Ferran; Gurses, Kerem

    for these different markets. We test our hypotheses on longitudinal dataset of 453 new firms started in 2004 in different high-tech industries in the US. We find that that technology and human capital resources favor the adoption of alternative commercialization strategies; nevertheless, we do not observe significant...... differences in the venture emergence or survival likelihood. Our findings offer a closer view of the venture emergence process of new firms, clarifying the causes and consequences of the technology commercialization choices....

  4. High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement

    International Nuclear Information System (INIS)

    Wang Tie-Jun; Li Tao; Du Fang-Fang; Deng Fu-Guo

    2011-01-01

    We present a quantum hyperdense coding protocol with hyperentanglement in polarization and spatial-mode degrees of freedom of photons first and then give the details for a quantum secure direct communication (QSDC) protocol based on this quantum hyperdense coding protocol. This QSDC protocol has the advantage of having a higher capacity than the quantum communication protocols with a qubit system. Compared with the QSDC protocol based on superdense coding with d-dimensional systems, this QSDC protocol is more feasible as the preparation of a high-dimension quantum system is more difficult than that of a two-level quantum system at present. (general)

  5. The subthalamic nucleus keeps you high on emotion: behavioral consequences of its inactivation

    Directory of Open Access Journals (Sweden)

    Yann ePelloux

    2014-12-01

    Full Text Available The subthalamic nucleus (STN belongs to the basal ganglia and is the current target for the surgical treatment of neurological and psychiatric disorders such as Parkinson’s Disease (PD and obsessive compulsive disorders, but also a proposed site for the treatment of addiction. It is therefore very important to understand its functions in order to anticipate and prevent possible side-effects in the patients. Although the involvement of the STN is well documented in motor, cognitive and motivational processes, less is known regarding emotional processes. Here we have investigated the direct consequences of STN inactivation by excitotoxic lesions on emotional processing and reinforcement in the rat. We have used various behavioral procedures to assess affect for neutral, positive and negative reinforcers in STN lesioned rats. STN lesions reduced affective responses for positive (sweet solutions and negative (electric foot shock, Lithium Chloride-induced sickness reinforcers while they had no effect on responses for a more neutral reinforcer (novelty induced place preference. Furthermore, when given the choice between saccharine, a sweet but non caloric solution, and glucose, a more bland but caloric solution, in contrast to sham animals that preferred saccharine, STN lesioned animals preferred glucose over saccharine. Taken altogether these results reveal that STN plays a critical role in emotional processing. These results, in line with some clinical observations in PD patients subjected to STN surgery, suggest possible emotional side-effects of treatments targeting the STN. They also suggest that the increased motivation for sucrose previously reported cannot be due to increased pleasure, but could be responsible for the decreased motivation for cocaine reported after STN inactivation.

  6. High capacity hydrogen absorption in transition-metal ethylene complexes: consequences of nanoclustering

    International Nuclear Information System (INIS)

    Phillips, A B; Shivaram, B S

    2009-01-01

    We have recently shown that organo-metallic complexes formed by laser ablating transition metals in ethylene are high hydrogen absorbers at room temperature (Phillips and Shivaram 2008 Phys. Rev. Lett. 100 105505). Here we show that the absorption percentage depends strongly on the ethylene pressure. High ethylene pressures (>100 mTorr) result in a lowered hydrogen uptake. Transmission electron microscopy measurements reveal that while low pressure ablations result in metal atoms dispersed uniformly on a near atomic scale, high pressure ones yield distinct nanoparticles with electron energy-loss spectroscopy demonstrating that the metal atoms are confined solely to the nanoparticles.

  7. EMBRYONIC VASCULAR DISRUPTION ADVERSE OUTCOMES: LINKING HIGH THROUGHPUT SIGNALING SIGNATURES WITH FUNCTIONAL CONSEQUENCES

    Science.gov (United States)

    Embryonic vascular disruption is an important adverse outcome pathway (AOP) given the knowledge that chemical disruption of early cardiovascular system development leads to broad prenatal defects. High throughput screening (HTS) assays provide potential building blocks for AOP d...

  8. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  12. The SEWD guideline on the security of other radioactive materials. What are the consequences for radiography?; Die SEWD-Richtlinie zur Sicherung von sonstigen radioaktiven Stoffen. Was bedeutet dies fuer die Radiographie?

    Energy Technology Data Exchange (ETDEWEB)

    Kosbadt, Oliver [Ministerium fuer Umwelt, Klima und Energiewirtschaft, Stuttgart (Germany)

    2017-08-01

    The situation of an aggravated international terroristic threat since the attacks in 2001 has invoked the consideration of abusive use of radioactive materials. In Germany the SEWD guideline for requirements concerning ''other'' radioactive materials including the evaluation of the hazard potential of radioactive materials, security categories, safety requirements and related security measures for different applications. The nondestructive materials testing will be concerned by this guideline due to the application of radioactive sources with high activity. The contribution discusses the most important aspects.

  13. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  14. Experimental Consequences of Mottness in High-Temperature Copper-Oxide Superconductors

    Science.gov (United States)

    Chakraborty, Shiladitya

    2009-01-01

    It has been more than two decades since the copper-oxide high temperature superconductors were discovered. However, building a satisfactory theoretical framework to study these compounds still remains one of the major challenges in condensed matter physics. In addition to the mechanism of superconductivity, understanding the properties of the…

  15. High-intensity interval exercise and cerebrovascular health: curiosity, cause, and consequence

    OpenAIRE

    Lucas, Samuel J E; Cotter, James D; Brassard, Patrice; Bailey, Damian M

    2015-01-01

    Exercise is a uniquely effective and pluripotent medicine against several noncommunicable diseases of westernised lifestyles, including protection against neurodegenerative disorders. High-intensity interval exercise training (HIT) is emerging as an effective alternative to current health-related exercise guidelines. Compared with traditional moderate-intensity continuous exercise training, HIT confers equivalent if not indeed superior metabolic, cardiac, and systemic vascular adaptation. Con...

  16. High Risk Behaviors in Marine Mammals: Linking Behavioral Responses to Anthropogenic Disturbance to Biological Consequences

    Science.gov (United States)

    2015-09-30

    1 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. High Risk Behaviors in Marine Mammals : Linking...comprehensive evaluation of biological safety zones for diving marine mammals . In this way we intend to identify those marine mammal species or specific...improving the protection of marine mammals during naval operations. OBJECTIVES We are testing the hypothesis that extreme behaviors requiring

  17. Portal hypertension in children: High-risk varices, primary prophylaxis and consequences of bleeding.

    Science.gov (United States)

    Duché, Mathieu; Ducot, Béatrice; Ackermann, Oanez; Guérin, Florent; Jacquemin, Emmanuel; Bernard, Olivier

    2017-02-01

    Primary prophylaxis of bleeding is debated for children with portal hypertension because of the limited number of studies on its safety and efficacy, the lack of a known endoscopic pattern carrying a high-risk of bleeding for all causes, and the assumption that the mortality of a first bleed is low. We report our experience with these issues. From 1989 to 2014, we managed 1300 children with portal hypertension. Endoscopic features were recorded; high-risk varices were defined as: grade 3 esophageal varices, grade 2 varices with red wale markings, or gastric varices. Two hundred forty-six children bled spontaneously and 182 underwent primary prophylaxis. The results of primary prophylaxis were reviewed as well as bleed-free survival, overall survival and life-threatening complications of bleeding. High-risk varices were found in 96% of children who bled spontaneously and in 11% of children who did not bleed without primary prophylaxis (pportal hypertension. Life-threatening complications of bleeding were recorded in 19% of children with cirrhosis and high-risk varices who bled spontaneously. Ten-year probabilities of bleed-free survival after primary prophylaxis in children with high-risk varices were 96% and 72% for non-cirrhotic causes and cirrhosis respectively. Ten-year probabilities of overall survival after primary prophylaxis were 100% and 93% in children with non-cirrhotic causes and cirrhosis respectively. In children with portal hypertension, bleeding is linked to the high-risk endoscopic pattern reported here. Primary prophylaxis of bleeding based on this pattern is fairly effective and safe. In children with liver disease, the risk of bleeding from varices in the esophagus is linked to their large size, the presence of congestion on their surface and their expansion into the stomach but not to the child's age nor to the cause of portal hypertension. Prevention of the first bleed in children with high-risk varices can be achieved by surgery or endoscopic

  18. Genetic consequences of forest fragmentation for a highly specialized arboreal mammal--the edible dormouse.

    Directory of Open Access Journals (Sweden)

    Joanna Fietz

    Full Text Available Habitat loss and fragmentation represent the most serious extinction threats for many species and have been demonstrated to be especially detrimental for mammals. Particularly, highly specialized species with low dispersal abilities will encounter a high risk of extinction in fragmented landscapes. Here we studied the edible dormouse (Glis glis, a small arboreal mammal that is distributed throughout Central Europe, where forests are mostly fragmented at different spatial scales. The aim of this study was to investigate the effect of habitat fragmentation on genetic population structures using the example of edible dormouse populations inhabiting forest fragments in south western Germany. We genotyped 380 adult individuals captured between 2001 and 2009 in four different forest fragments and one large continuous forest using 14 species-specific microsatellites. We hypothesised, that populations in small forest patches have a lower genetic diversity and are more isolated compared to populations living in continuous forests. In accordance with our expectations we found that dormice inhabiting forest fragments were isolated from each other. Furthermore, their genetic population structure was more unstable over the study period than in the large continuous forest. Even though we could not detect lower genetic variability within individuals inhabiting forest fragments, strong genetic isolation and an overall high risk to mate with close relatives might be precursors to a reduced genetic variability and the onset of inbreeding depression. Results of this study highlight that connectivity among habitat fragments can already be strongly hampered before genetic erosion within small and isolated populations becomes evident.

  19. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  20. Development and applications of diffractive optical security devices for banknotes and high value documents

    Science.gov (United States)

    Drinkwater, John K.; Holmes, Brian W.; Jones, Keith A.

    2000-04-01

    Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.

  1. High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs

    International Nuclear Information System (INIS)

    Xiao Min; Xu Hong-Wei

    2015-01-01

    A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security. (paper)

  2. Comparative consideration and design of a security depot for high radioactive glass-enclosed materials

    International Nuclear Information System (INIS)

    Jaroni, U.

    1985-01-01

    From the beginning of 1990 the COGEMA shall supply glass-enclosed high radioactive waste of the reprocessing of German fuel elements back to the Federal Republic of Germany. As to this time the final waste storage in the salt stock of Gorleben will not be available the glass cannisters have to be deposited above ground. First a comparison is made out of a number of proposed storage concepts for the deposition of HAW-glass blocks. The safety technical behaviour of the facility is considered. On the basis of the gained results a new facility design is presented, which can take 450 glass cannisters in a discoid built up cast-steel vessel and makes possible the utilization of the resulting radioactive heat of dissociation. During the development of this concept besides a compact, reasonable method of building and the thermodynamic behaviour of the storage the aspect of high security against release of radioactive materials was emphasized. (orig.) [de

  3. Method and device for secure, high-density tritium bonded with carbon

    Science.gov (United States)

    Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony; Norby, Brad Curtis

    2016-04-05

    A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof. The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.

  4. The consequences of high cigarette excise taxes for low-income smokers.

    Directory of Open Access Journals (Sweden)

    Matthew C Farrelly

    Full Text Available BACKGROUND: To illustrate the burden of high cigarette excise taxes on low-income smokers. METHODOLOGY/PRINCIPAL FINDINGS: Using data from the New York and national Adult Tobacco Surveys from 2010-2011, we estimated how smoking prevalence, daily cigarette consumption, and share of annual income spent on cigarettes vary by annual income (less than $30,000; $30,000-$59,999; and more than $60,000. The 2010-2011 sample includes 7,536 adults and 1,294 smokers from New York and 3,777 adults and 748 smokers nationally. Overall, smoking prevalence is lower in New York (16.1% than nationally (22.2% and is strongly associated with income in New York and nationally (P<.001. Smoking prevalence ranges from 12.2% to 33.7% nationally and from 10.1% to 24.3% from the highest to lowest income group. In 2010-2011, the lowest income group spent 23.6% of annual household income on cigarettes in New York (up from 11.6% in 2003-2004 and 14.2% nationally. Daily cigarette consumption is not related to income. CONCLUSIONS/SIGNIFICANCE: Although high cigarette taxes are an effective method for reducing cigarette smoking, they can impose a significant financial burden on low-income smokers.

  5. Isotope and fast ions turbulence suppression effects: Consequences for high-β ITER plasmas

    Science.gov (United States)

    Garcia, J.; Görler, T.; Jenko, F.

    2018-05-01

    The impact of isotope effects and fast ions on microturbulence is analyzed by means of non-linear gyrokinetic simulations for an ITER hybrid scenario at high beta obtained from previous integrated modelling simulations with simplified assumptions. Simulations show that ITER might work very close to threshold, and in these conditions, significant turbulence suppression is found from DD to DT plasmas. Electromagnetic effects are shown to play an important role in the onset of this isotope effect. Additionally, even external ExB flow shear, which is expected to be low in ITER, has a stronger impact on DT than on DD. The fast ions generated by fusion reactions can additionally reduce turbulence even more although the impact in ITER seems weaker than in present-day tokamaks.

  6. Molecular origins and consequences of High-800 LH2 in Roseobacter denitrificans.

    Science.gov (United States)

    Duquesne, Katia; Blanchard, Cecile; Sturgis, James N

    2011-08-09

    Roseobacter denitrificans is a marine bacterium capable of using a wide variety of different metabolic schemes and in particular is an anoxygenic aerobic photosynthetic bacterium. In the work reported here we use a deletion mutant that we have constructed to investigate the structural origin of the unusual High-800 light-harvesting complex absorption in this bacterium. We suggest that the structure is essentially unaltered when compared to the usual nonameric complexes but that a change in the environment of the C(13:1) carbonyl group is responsible for the change in spectrum. We tentatively relate this change to the presence of a serine residue in the α-polypeptide. Surprisingly, the low spectral overlap between the peripheral and core light-harvesting systems appears not to compromise energy collection efficiency too severely. We suggest that this may be at the expense of maintaining a low antenna size. © 2011 American Chemical Society

  7. Challenges of characterization of radioactive waste with High composition variability and their consequences measurement methodology

    International Nuclear Information System (INIS)

    Lexa, D.

    2014-01-01

    Radioactive waste characterization is a key step in every nuclear decommissioning project. It normally relies on a combination of facility operational history with results of destructive and non-destructive analysis. A particularly challenging situation arises when historical waste from a nuclear research facility is to be characterized, meaning little or no radiological information is available and the composition of the waste is highly variable. The nuclide vector concept is of limited utility, resulting in increased requirements placed on both the extent and performance of destructive and non-destructive analysis. Specific challenges are illustrated on an example of the decommissioning project underway at the Joint Research Center of the European Commission in Ispra. (author)

  8. Evidence and Consequence of a Highly Adapted Clonal Haplotype within the Australian Ascochyta rabiei Population

    Directory of Open Access Journals (Sweden)

    Yasir Mehmood

    2017-06-01

    Full Text Available The Australian Ascochyta rabiei (Pass. Labr. (syn. Phoma rabiei population has low genotypic diversity with only one mating type detected to date, potentially precluding substantial evolution through recombination. However, a large diversity in aggressiveness exists. In an effort to better understand the risk from selective adaptation to currently used resistance sources and chemical control strategies, the population was examined in detail. For this, a total of 598 isolates were quasi-hierarchically sampled between 2013 and 2015 across all major Australian chickpea growing regions and commonly grown host genotypes. Although a large number of haplotypes were identified (66 through short sequence repeat (SSR genotyping, overall low gene diversity (Hexp = 0.066 and genotypic diversity (D = 0.57 was detected. Almost 70% of the isolates assessed were of a single dominant haplotype (ARH01. Disease screening on a differential host set, including three commonly deployed resistance sources, revealed distinct aggressiveness among the isolates, with 17% of all isolates identified as highly aggressive. Almost 75% of these were of the ARH01 haplotype. A similar pattern was observed at the host level, with 46% of all isolates collected from the commonly grown host genotype Genesis090 (classified as “resistant” during the term of collection identified as highly aggressive. Of these, 63% belonged to the ARH01 haplotype. In conclusion, the ARH01 haplotype represents a significant risk to the Australian chickpea industry, being not only widely adapted to the diverse agro-geographical environments of the Australian chickpea growing regions, but also containing a disproportionately large number of aggressive isolates, indicating fitness to survive and replicate on the best resistance sources in the Australian germplasm.

  9. Uremic anorexia: a consequence of persistently high brain serotonin levels? The tryptophan/serotonin disorder hypothesis.

    Science.gov (United States)

    Aguilera, A; Selgas, R; Codoceo, R; Bajo, A

    2000-01-01

    Anorexia is a frequent part of uremic syndrome, contributing to malnutrition in dialysis patients. Many factors have been suggested as responsible for uremic anorexia. In this paper we formulate a new hypothesis to explain the appetite disorders in dialysis patients: "the tryptophan/serotonin disorder hypothesis." We review current knowledge of normal hunger-satiety cycle control and the disorders described in uremic patients. There are four phases in food intake regulation: (1) the gastric phase, during which food induces satiety through gastric distention and satiety peptide release; (2) the post absorptive phase, during which circulating compounds, including glucose and amino acids, cause satiety by hepatic receptors via the vagus nerve; (3) the hepatic phase, during which adenosine triphosphate (ATP) concentration is the main stimulus inducing hunger or satiety, with cytokines inhibiting ATP production; and (4) the central phase, during which appetite is regulated through peripheral (circulating plasma substances and neurotransmitters) and brain stimuli. Brain serotonin is the final target for peripheral mechanisms controlling appetite. High brain serotonin levels and a lower serotonin/dopamine ratio cause anorexia. Plasma and brain amino acid concentrations are recognized factors involved in neurotransmitter synthesis and appetite control. Tryptophan is the substrate of serotonin synthesis. High plasma levels of anorectics such as tryptophan (plasma and brain), cholecystokinin, tumor necrosis factor alpha, interleukin-1, and leptin, and deficiencies of nitric oxide and neuropeptide Y have been described in uremia; all increase intracerebral serotonin. We suggest that brain serotonin hyperproduction due to a uremic-dependent excess of tryptophan may be the final common pathway involved in the genesis of uremic anorexia. Various methods of ameliorating anorexia by decreasing the central effects of serotonin are proposed.

  10. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  11. Peer-to-peer computing for secure high performance data copying

    International Nuclear Information System (INIS)

    Hanushevsky, A.; Trunov, A.; Cottrell, L.

    2001-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model--if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, the authors present the bbcp architecture, it's various features, and the reasons for their inclusion

  12. Peer-to-Peer Computing for Secure High Performance Data Copying

    International Nuclear Information System (INIS)

    2002-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model -- if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, we preset the bbcp architecture, it's various features, and the reasons for their inclusion

  13. Lived experience of working with female patients in a high-secure mental health setting.

    Science.gov (United States)

    Beryl, Rachel; Davies, Jason; Völlm, Birgit

    2018-02-01

    Women's secure hospitals are often considered to be stressful and demanding places to work, with these environments characterized as challenging and violent. However, the staff experience of working in this environment is not well represented in the literature. The present study is the first to examine the 'lived experience' of seven nurses working in the National High Secure Healthcare Service for Women. Interview transcripts were analysed with the use of interpretative phenomenological analysis, and the findings presented within four superordinate themes 'horror', 'balancing acts', 'emotional hard labour', and 'the ward as a community'. These themes all depict the challenges that participants experience in their work, the ways in which they cope with these challenges, and how they make sense of these experiences. A meta-theme of 'making sense by understanding why' is also presented, which represents the importance for participants to attempt to make sense of the tensions and challenges by formulating a fuller meaning. The findings suggest the importance of workforce development in terms of allowing sufficient protected time for reflection and formulation (e.g. within the format of group supervision or reflective practice), and for staff-support mechanisms (e.g. clinical supervision, counselling, debriefs) to be inbuilt into the ethos of a service, so as to provide proactive support for staff 'on the frontline'. © 2016 Australian College of Mental Health Nurses Inc.

  14. Characterization and consequences of intermittent sediment oxygenation by macrofauna: interpretation of high-resolution data sets

    Science.gov (United States)

    Meile, C. D.; Dwyer, I.; Zhu, Q.; Polerecky, L.; Volkenborn, N.

    2017-12-01

    Mineralization of organic matter in marine sediments leads to the depletion of oxygen, while activities of infauna introduce oxygenated seawater to the subsurface. In permeable sediments solutes can be transported from animals and their burrows into the surrounding sediment through advection over several centimeters. The intermittency of pumping leads to a spatially heterogeneous distribution of oxidants, with the temporal dynamics depending on sediment reactivity and activity patterns of the macrofauna. Here, we present results from a series of experiments in which these dynamics are studied at high spatial and temporal resolution using planar optodes. From O2, pH and pCO2 optode data, we quantify rates of O2 consumption and dissolved inorganic carbon production, as well alkalinity dynamics, with millimeter-scale resolution. Simulating intermittent irrigation by imposed pumping patterns in thin aquaria, we derive porewater flow patterns, which together with the production and consumption rates cause the chemical distributions and the establishment of reaction fronts. Our analysis thus establishes a quantitative connection between the locally dynamic redox conditions relevant for biogeochemical transformations and macroscopic observations commonly made with sediment cores.

  15. Uncertainties in geologic disposal of high-level wastes - groundwater transport of radionuclides and radiological consequences

    International Nuclear Information System (INIS)

    Kocher, D.C.; Sjoreen, A.L.; Bard, C.S.

    1983-01-01

    The analysis for radionuclide transport in groundwater considers models and methods for characterizing (1) the present geologic environment and its future evolution due to natural geologic processes and to repository development and waste emplacement, (2) groundwater hydrology, (3) radionuclide geochemistry, and (4) the interactions among these phenomena. The discussion of groundwater transport focuses on the nature of the sources of uncertainty rather than on quantitative estimates of their magnitude, because of the lack of evidence that current models can provide realistic quantitative predictions of radionuclide transport in groundwater for expected repository environments. The analysis for the long-term health risk to man following releases of long-lived radionuclides to the biosphere is more quantitative and involves estimates of uncertainties in (1) radionuclide concentrations in man's exposure environment, (2) radionuclide intake by exposed individuals per unit concentration in the environment, (3) the dose per unit intake, (4) the number of exposed individuals, and (5) the health risk per unit dose. For the important long-lived radionuclides in high-level waste, uncertainties in most of the different components of a calculation of individual and collective dose per unit release appear to be no more than two or three orders of magnitude; these uncertainties are certainly much less than uncertainties in predicting groundwater transport of radionuclides between a repository and the biosphere. Several limitations in current models for predicting the health risk to man per unit release to the biosphere are discussed

  16. Metal stress consequences on frost hardiness of plants at northern high latitudes: a review and hypothesis

    International Nuclear Information System (INIS)

    Taulavuori, Kari; Prasad, M.N.V.; Taulavuori, Erja; Laine, Kari

    2005-01-01

    This paper reviews the potential of trace/heavy metal-induced stress to reduce plant frost hardiness at northern high latitudes. The scientific questions are first outlined prior to a brief summary of heavy metal tolerance. The concepts of plant capacity and survival adaptation were used to formulate a hypothesis, according to which heavy metal stress may reduce plant frost hardiness for the following reasons: (1) Heavy metals change membrane properties through impaired resource acquisition and subsequent diminution of the cryoprotectant pool. (2) Heavy metals change membrane properties directly through oxidative stress, i.e. an increase of active oxygen species. (3) The involved co-stress may further increase oxidative stress. (4) The risk of frost injury increases due to membrane alterations. An opposite perspective was also discussed: could metal stress result in enhanced plant frost hardiness? This phenomenon could be based on the metabolism (i.e. glutathione, polyamines, proline, heat shock proteins) underlying a possible general adaptation syndrome of stress (GAS). As a result of the review it was suggested that metal-induced stress seems to reduce rather than increase plant frost hardiness. - Metal stress may reduce plant frost hardiness

  17. Metal stress consequences on frost hardiness of plants at northern high latitudes: a review and hypothesis.

    Science.gov (United States)

    Taulavuori, Kari; Prasad, M N V; Taulavuori, Erja; Laine, Kari

    2005-05-01

    This paper reviews the potential of trace/heavy metal-induced stress to reduce plant frost hardiness at northern high latitudes. The scientific questions are first outlined prior to a brief summary of heavy metal tolerance. The concepts of plant capacity and survival adaptation were used to formulate a hypothesis, according to which heavy metal stress may reduce plant frost hardiness for the following reasons: (1) Heavy metals change membrane properties through impaired resource acquisition and subsequent diminution of the cryoprotectant pool. (2) Heavy metals change membrane properties directly through oxidative stress, i.e. an increase of active oxygen species. (3) The involved co-stress may further increase oxidative stress. (4) The risk of frost injury increases due to membrane alterations. An opposite perspective was also discussed: could metal stress result in enhanced plant frost hardiness? This phenomenon could be based on the metabolism (i.e. glutathione, polyamines, proline, heat shock proteins) underlying a possible general adaptation syndrome of stress (GAS). As a result of the review it was suggested that metal-induced stress seems to reduce rather than increase plant frost hardiness.

  18. Metal stress consequences on frost hardiness of plants at northern high latitudes: a review and hypothesis

    Energy Technology Data Exchange (ETDEWEB)

    Taulavuori, Kari [Department of Biology, University of Oulu, PO Box 3000, FIN-90014, Oulu (Finland)]. E-mail: kari.taulavuori@oulu.fi; Prasad, M.N.V. [Department of Plant Sciences, University of Hyderabad, Hyderabad 500 046, Andhra Pradesh (India); Taulavuori, Erja [Department of Biology, University of Oulu, PO Box 3000, FIN-90014, Oulu (Finland); Laine, Kari [Department of Biology, University of Oulu, PO Box 3000, FIN-90014, Oulu (Finland)

    2005-05-01

    This paper reviews the potential of trace/heavy metal-induced stress to reduce plant frost hardiness at northern high latitudes. The scientific questions are first outlined prior to a brief summary of heavy metal tolerance. The concepts of plant capacity and survival adaptation were used to formulate a hypothesis, according to which heavy metal stress may reduce plant frost hardiness for the following reasons: (1) Heavy metals change membrane properties through impaired resource acquisition and subsequent diminution of the cryoprotectant pool. (2) Heavy metals change membrane properties directly through oxidative stress, i.e. an increase of active oxygen species. (3) The involved co-stress may further increase oxidative stress. (4) The risk of frost injury increases due to membrane alterations. An opposite perspective was also discussed: could metal stress result in enhanced plant frost hardiness? This phenomenon could be based on the metabolism (i.e. glutathione, polyamines, proline, heat shock proteins) underlying a possible general adaptation syndrome of stress (GAS). As a result of the review it was suggested that metal-induced stress seems to reduce rather than increase plant frost hardiness. - Metal stress may reduce plant frost hardiness.

  19. Behavioral and cellular consequences of high-electrode count Utah Arrays chronically implanted in rat sciatic nerve

    Science.gov (United States)

    Wark, H. A. C.; Mathews, K. S.; Normann, R. A.; Fernandez, E.

    2014-08-01

    Objective. Before peripheral nerve electrodes can be used for the restoration of sensory and motor functions in patients with neurological disorders, the behavioral and histological consequences of these devices must be investigated. These indices of biocompatibility can be defined in terms of desired functional outcomes; for example, a device may be considered for use as a therapeutic intervention if the implanted subject retains functional neurons post-implantation even in the presence of a foreign body response. The consequences of an indwelling device may remain localized to cellular responses at the device-tissue interface, such as fibrotic encapsulation of the device, or they may affect the animal more globally, such as impacting behavioral or sensorimotor functions. The objective of this study was to investigate the overall consequences of implantation of high-electrode count intrafascicular peripheral nerve arrays, High Density Utah Slanted Electrode Arrays (HD-USEAs; 25 electrodes mm-2). Approach. HD-USEAs were implanted in rat sciatic nerves for one and two month periods. We monitored wheel running, noxious sensory paw withdrawal reflexes, footprints, nerve morphology and macrophage presence at the tissue-device interface. In addition, we used a novel approach to contain the arrays in actively behaving animals that consisted of an organic nerve wrap. A total of 500 electrodes were implanted across all ten animals. Main results. The results demonstrated that chronic implantation (⩽8 weeks) of HD-USEAs into peripheral nerves can evoke behavioral deficits that recover over time. Morphology of the nerve distal to the implantation site showed variable signs of nerve fiber degeneration and regeneration. Cytology adjacent to the device-tissue interface also showed a variable response, with some electrodes having many macrophages surrounding the electrodes, while other electrodes had few or no macrophages present. This variability was also seen along the length

  20. High temperature oxidation of metals: vacancy injection and consequences on the mechanical properties

    International Nuclear Information System (INIS)

    Perusin, S.

    2004-11-01

    The aim of this work is to account for the effects of the high temperature oxidation of metals on their microstructure and their mechanical properties. 'Model' materials like pure nickel, pure iron and the Ni-20Cr alloy are studied. Nickel foils have been oxidised at 1000 C on one side only in laboratory air, the other side being protected from oxidation by a reducing atmosphere. After the oxidation treatment, the unoxidized face was carefully examined by using an Atomic Force Microscope (AFM). Grain boundaries grooves were characterised and their depth were compared to the ones obtained on the same sample heat treated in the reducing atmosphere during the same time. They are found to be much deeper in the case of the single side oxidised samples. It is shown that this additional grooving is directly linked to the growth of the oxide scale on the opposite side and that it can be explained by the diffusion of the vacancies produced at the oxide scale - metal interface, across the entire sample through grain boundaries. Moreover, the comparison between single side oxidised samples and samples oxidised on both sides points out that voids in grain boundaries are only observed in this latter case proving the vacancies condensation in the metal when the two faces are oxidised. The role of the carbon content and the sample's geometry on this phenomenon is examined in detail. The diffusion of vacancies is coupled with the transport of oxygen so that a mechanism of oxygen transport by vacancies is suggested. The tensile tests realised at room temperature on nickel foils (bamboo microstructure) show that the oxide scale can constitute a barrier to the emergence of dislocations at the metal surface. Finally, the Ni-20Cr alloy is tested in tensile and creep tests between 25 and 825 C in oxidising or reducing atmospheres. (author)

  1. Consequences of high effective Prandtl number on solar differential rotation and convective velocity

    Science.gov (United States)

    Karak, Bidya Binay; Miesch, Mark; Bekki, Yuto

    2018-04-01

    Observations suggest that the large-scale convective velocities obtained by solar convection simulations might be over-estimated (convective conundrum). One plausible solution to this could be the small-scale dynamo which cannot be fully resolved by global simulations. The small-scale Lorentz force suppresses the convective motions and also the turbulent mixing of entropy between upflows and downflows, leading to a large effective Prandtl number (Pr). We explore this idea in three-dimensional global rotating convection simulations at different thermal conductivity (κ), i.e., at different Pr. In agreement with previous non-rotating simulations, the convective velocity is reduced with the increase of Pr as long as the thermal conductive flux is negligible. A subadiabatic layer is formed near the base of the convection zone due to continuous deposition of low entropy plumes in low-κ simulations. The most interesting result of our low-κ simulations is that the convective motions are accompanied by a change in the convection structure that is increasingly influenced by small-scale plumes. These plumes tend to transport angular momentum radially inward and thus establish an anti-solar differential rotation, in striking contrast to the solar rotation profile. If such low diffusive plumes, driven by the radiative-surface cooling, are present in the Sun, then our results cast doubt on the idea that a high effective Pr may be a viable solution to the solar convective conundrum. Our study also emphasizes that any resolution of the conundrum that relies on the downward plumes must take into account the angular momentum transport and heat transport.

  2. The Convergence of High-Consequence Livestock and Human Pathogen Research and Development: A Paradox of Zoonotic Disease

    Directory of Open Access Journals (Sweden)

    Julia M. Michelotti

    2018-05-01

    Full Text Available The World Health Organization (WHO estimates that zoonotic diseases transmitted from animals to humans account for 75 percent of new and emerging infectious diseases. Globally, high-consequence pathogens that impact livestock and have the potential for human transmission create research paradoxes and operational challenges for the high-containment laboratories that conduct work with them. These specialized facilities are required for conducting all phases of research on high-consequence pathogens (basic, applied, and translational with an emphasis on both the generation of fundamental knowledge and product development. To achieve this research mission, a highly-trained workforce is required and flexible operational methods are needed. In addition, working with certain pathogens requires compliance with regulations such as the Centers for Disease Control (CDC and the U.S. Department of Agriculture (USDA Select Agent regulations, which adds to the operational burden. The vast experience from the existing studies at Plum Island Animal Disease Center, other U.S. laboratories, and those in Europe and Australia with biosafety level 4 (BSL-4 facilities designed for large animals, clearly demonstrates the valuable contribution this capability brings to the efforts to detect, prepare, prevent and respond to livestock and potential zoonotic threats. To raise awareness of these challenges, which include biosafety and biosecurity issues, we held a workshop at the 2018 American Society for Microbiology (ASM Biothreats conference to further discuss the topic with invited experts and audience participants. The workshop covered the subjects of research funding and metrics, economic sustainment of drug and vaccine development pipelines, workforce turnover, and the challenges of maintaining operational readiness of high containment laboratories.

  3. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  4. Effects of strength training on muscle fiber types and size; consequences for athletes training for high-intensity sport

    DEFF Research Database (Denmark)

    Andersen, J L; Aagaard, P

    2010-01-01

    Training toward improving performance in sports involving high intense exercise can and is done in many different ways based on a mixture of tradition in the specific sport, coaches' experience and scientific recommendations. Strength training is a form of training that now-a-days have found its...... way into almost all sports in which high intense work is conducted. In this review we will focus on a few selected aspects and consequences of strength training; namely what effects do strength training have of muscle fiber type composition, and how may these effects change the contractile properties...... functional training advises can be made. Thus, more than a review in the traditional context this review should be viewed upon as an attempt to bring sports-physiologists and coaches or others working directly with the athletes together for a mutual discussion on how recently acquired physiological knowledge...

  5. Economic consequences of mastitis and withdrawal of milk with high somatic cell count in Swedish dairy herds

    DEFF Research Database (Denmark)

    Nielsen, C; Østergaard, Søren; Emanuelson, U

    2010-01-01

    Herd, was used to study the effects of mastitis in a herd with 150 cows. Results given the initial incidence of mastitis (32 and 33 clinical and subclinical cases per 100 cow-years, respectively) were studied, together with the consequences of reducing or increasing the incidence of mastitis by 50%, modelling......% of the herd net return given the initial incidence of mastitis. Expressed per cow-year, the avoidable cost of mastitis was €55. The costs per case of CM and SCM were estimated at €278 and €60, respectively. Withdrawing milk with high SCC was never profitable because this generated a substantial amount of milk......The main aim was to assess the impact of mastitis on technical and economic results of a dairy herd under current Swedish farming conditions. The second aim was to investigate the effects obtained by withdrawing milk with high somatic cell count (SCC). A dynamic and stochastic simulation model, Sim...

  6. Effects of strength training on muscle fiber types and size; consequences for athletes training for high-intensity sport

    DEFF Research Database (Denmark)

    Andersen, J L; Aagaard, P

    2010-01-01

    way into almost all sports in which high intense work is conducted. In this review we will focus on a few selected aspects and consequences of strength training; namely what effects do strength training have of muscle fiber type composition, and how may these effects change the contractile properties......Training toward improving performance in sports involving high intense exercise can and is done in many different ways based on a mixture of tradition in the specific sport, coaches' experience and scientific recommendations. Strength training is a form of training that now-a-days have found its...... functional training advises can be made. Thus, more than a review in the traditional context this review should be viewed upon as an attempt to bring sports-physiologists and coaches or others working directly with the athletes together for a mutual discussion on how recently acquired physiological knowledge...

  7. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    Science.gov (United States)

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  9. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    Science.gov (United States)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  10. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    International Nuclear Information System (INIS)

    Sau, Suman; Chakrabarti, Amlan; Saini, Jogender; Chattopadhyay, Subhasis; Mandal, Swagata

    2015-01-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  11. An overview of the roles and structure of international high-security veterinary laboratories for infectious animal diseases.

    Science.gov (United States)

    Murray, P K

    1998-08-01

    The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.

  12. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  13. Marijuana usage in relation to harmfulness ratings, perceived likelihood of negative consequences, and defense mechanisms in high school students.

    Science.gov (United States)

    Como-Lesko, N; Primavera, L H; Szeszko, P R

    1994-08-01

    This study investigated high school students' marijuana usage patterns in relation to their harmfulness ratings of 15 licit and illicit drugs, perceived negative consequences from using marijuana, and types of defense mechanisms employed. Subjects were classified into one of five pattern-of-use groups based on marijuana usage: principled nonusers, nonusers, light users, moderate users, and heavy users. Principled nonusers (individuals who have never used marijuana and would not do so if it was legalized) rated marijuana, hashish, cocaine, and alcohol as significantly more harmful than heavy users. A cluster analysis of the drugs' harmfulness ratings best fit a three cluster solution and were named medicinal drugs, recreational drugs, and hard drugs. In general, principled nonusers rated negative consequences from using marijuana as significantly more likely to occur than other groups. Principled nonusers and heavy users utilized reversal from the Defense Mechanism Inventory, which includes repression and denial, significantly more than nonusers, indicating some trait common to the two extreme pattern-of-use groups.

  14. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  15. Actual directions in study of ecological consequences of a highly toxic 1,1-dimethylhydrazine-based rocket fuel spills

    Directory of Open Access Journals (Sweden)

    Bulat Kenessov

    2012-05-01

    Full Text Available The paper represents a review of the actual directions in study of ecological consequences of highly toxic 1,1-dimethylhydrazine-based rocket fuel spills. Recent results on study of processes of transformation of 1,1-dimethylhydrazine, identification of its main metabolites and development of analytical methods for their determination are generalized. Modern analytical methods of determination of 1,1-dimethylhydrazine and its transformation products in environmental samples are characterized. It is shown that in recent years, through the use of most modern methods of physical chemical analysis and sample preparation, works in this direction made significant progress and contributed to the development of studies in adjacent areas. A character of distribution of transformation products in soils of fall places of first stages of rocket-carriers is described and the available methods for their remediation are characterized.

  16. Magnitude and reactivity consequences of accidental moisture ingress into the Modular High-Temperature Gas-Cooled Reactor core

    International Nuclear Information System (INIS)

    Smith, O.L.

    1992-01-01

    Accidental admission of moisture into the primary system of a Modular High-Temperature Gas-Cooled Reactor (MHTGR) has been identified in US Department of Energy-sponsored studies as an important safety concern. The work described here develops an analytical methodology to quantify the pressure and reactivity consequences of steam-generator tube rupture and other moistureingress-related incidents. Important neutronic and thermohydraulic processes are coupled with reactivity feedback and safety and control system responses. Rate and magnitude of steam buildup are found to be dominated by major system features such as break size in comparison with safety valve capacity and reliability, while being less sensitive to factors such as heat transfer coefficients. The results indicate that ingress transients progress at a slower pace than previously predicted by bounding analyses, with milder power overshoots and more time for operator or automatic corrective actions

  17. Magnitude and reactivity consequences of moisture ingress into the modular High-Temperature Gas-Cooled Reactor core

    International Nuclear Information System (INIS)

    Smith, O.L.

    1992-12-01

    Inadvertent admission of moisture into the primary system of a modular high-temperature gas-cooled reactor has been identified in US Department of Energy-sponsored studies as an important safety concern. The work described here develops an analytical methodology to quantify the pressure and reactivity consequences of steam-generator tube rupture and other moisture-ingress-related incidents. Important neutronic and thermohydraulic processes are coupled with reactivity feedback and safety and control system responses. The rate and magnitude of steam buildup are found to be dominated by major system features such as break size compared with safety valve capacity and reliability and less sensitive to factors such as heat transfer coefficients. The results indicate that ingress transients progress at a slower pace than previously predicted by bounding analyses, with milder power overshoots and more time for operator or automatic corrective actions

  18. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  19. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    policies, which are superior in terms of their welfare effects and fiscal costs and might also be politically feasible. These findings have important implications on the ongoing debates on India's food security policy, particularly in relation to the discussion on its National Food Security Act....

  20. Providing strong Security and high privacy in low-cost RFID networks

    DEFF Research Database (Denmark)

    David, Mathieu; Prasad, Neeli R.

    2009-01-01

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security...

  1. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  2. What do prisoners eat? Nutrient intakes and food practices in a high-secure prison.

    Science.gov (United States)

    Hannan-Jones, Mary; Capra, Sandra

    2016-04-01

    There are limited studies on the adequacy of prisoner diet and food practices, yet understanding these are important to inform food provision and assure duty of care for this group. The aim of this study was to assess the dietary intakes of prisoners to inform food and nutrition policy in this setting. This research used a cross-sectional design with convenience sampling in a 945-bed male high-secure prison. Multiple methods were used to assess food available at the group level, including verification of food portion, quality and practices. A pictorial tool supported the diet history method. Of 276 eligible prisoners, 120 dietary interviews were conducted and verified against prison records, with 106 deemed plausible. The results showed the planned food to be nutritionally adequate, with the exception of vitamin D for older males and long-chain fatty acids, with Na above upper limits. The Australian dietary targets for chronic disease risk were not achieved. High energy intakes were reported with median 13·8 (se 0·3) MJ. Probability estimates of inadequate intake varied with age groups: Mg 8 % (>30 years), 2·9 % (70 years), 1·5 % (food provision in the prison environment and also poses questions for population-level dietary guidance in delivering appropriate nutrients within energy limits.

  3. An assessment of the radiological consequences of disposal of high-level waste in coastal geologic formations

    International Nuclear Information System (INIS)

    Hill, M.D.; Lawson, G.

    1980-11-01

    This study was carried out with the objectives of assessing the potential radiological consequences of entry of circulating ground-water into a high-level waste repository sited on the coast; and comparing the results with those of previous assessments for a repository sited inland. Mathematical models are used to calculate the rate of release of radioactivity into ground-water by leaching, the rates of migration of radionuclides with ground-water from the repository to the sea and the concentrations of radionuclides in sea-water and sea-food as a function of time. Estimates are made of the peak annual collective doses and collective dose commitments which could be received as a result of sea-food consumption. Since there are considerable uncertainties associated with the values of many of the parameters used in the calculations the broad features of the results are more significant than the numerical values of predicted annual doses and collective dose commitments. The results of the assessment show that the rates of migration of radionuclides with ground-water are of primary importance in determining the radiological impact of ground-water ingress. The implications of this result for selection of coastal sites and allocation of research effort are discussed. The comparison of coastal and inland sites suggest that coastal siting may have substantial advantages in terms of the radiological consequences to the public after disposal and that a significant fraction of available research effort should therefore be directed towards investigation of coastal sites. This study has been carried out under contract to the United Kingdom Atomic Energy Authority, Harwell, on behalf of the Commission of the European Communities. (author)

  4. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  5. The effects of actinide separation on the radiological consequences of geologic disposal of high-level waste

    International Nuclear Information System (INIS)

    Hill, M.D.; White, I.F.; Fleishman, A.B.

    1980-01-01

    It has often been suggested that the potential hazard to man from the disposal of high-level radioactive waste could be reduced by removing a substantial fraction of the actinide elements. In this report the effects of actinide separation on the radiological consequences of one of the disposal options currently under consideration, that of burial in deep geologic formations, are examined. The results show that the potential radiological impact of geologic disposal of high-level waste arises from both long-lived fission products and actinides (and their daughter radionuclides). Neither class of radionuclides is of overriding importance and actinide separation would therefore reduce the radiological impact to only a limited extent and over limited periods. There might be a case for attempting to reduce doses from 237 Np. To achieve this it appears to be necessary to separate both neptunium and its precursor element americium. However, there are major uncertainties in the data needed to predict doses from 237 Np; further research is required to resolve these uncertainties. In addition, consideration should be given to alternative methods of reducing the radiological impact of geologic disposal. The conclusions of this assessment differ considerably from those of similar studies based on the concept of toxicity indices. Use of these indices can lead to incorrect allocation of research and development effort. (author)

  6. Bridging nuclear safety, security and safeguards at geological disposl of high level radioactive waste and spent nuclear fuel

    International Nuclear Information System (INIS)

    Niemeyer, Irmgard; Deissmann, Guido; Bosbach, Dirk

    2016-01-01

    Findings and recommendations: • Further R&D needed to identify concepts, methods and technologies that would be best suited for the holistic consideration of safety, security and safeguards provisions of geological disposal. • 3S ‘toolbox’, including concepts, methods and technologies for: ■ material accountancy, ■ measurement techniques for spent fuel verification, ■ containment and surveillance, ■ analysis of open source information, ■ environmental sampling and monitoring, ■ continuity of knowledge, ■ design implications. •: Bridging safety, security and safeguards in research funding and research activities related to geological disposal of high-level radioactive waste and spent nuclear fuel.

  7. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  8. Plan Colombia, Consequences for Venezuelan Natonal Security

    National Research Council Canada - National Science Library

    Arroyo, Alfredo

    2002-01-01

    ...% reduction in cocaine production), and narcotics trafficking groups move into Venezuela, the government will have to commit its Armed Forces but, under unequal military and technological conditions when compared to Colombia...

  9. High-precision atmospheric parameter and abundance determination of massive stars, and consequences for stellar and Galactic evolution

    International Nuclear Information System (INIS)

    Nieva, Maria-Fernanda; Przybilla, Norbert; Irrgang, Andreas

    2011-01-01

    The derivation of high precision/accuracy parameters and chemical abundances of massive stars is of utmost importance to the fields of stellar evolution and Galactic chemical evolution. We concentrate on the study of OB-type stars near the main sequence and their evolved progeny, the BA-type supergiants, covering masses of ∼6 to 25 solar masses and a range in effective temperature from ∼8000 to 35 000 K. The minimization of the main sources of systematic errors in the atmospheric model computation, the observed spectra and the quantitative spectral analysis play a critical role in the final results. Our self-consistent spectrum analysis technique employing a robust non-LTE line formation allows precise atmospheric parameters of massive stars to be derived, achieving 1σ-uncertainties as low as 1% in effective temperature and ∼0.05–0.10 dex in surface gravity. Consequences on the behaviour of the chemical elements carbon, nitrogen and oxygen are discussed here in the context of massive star evolution and Galactic chemical evolution, showing tight relations covered in previous work by too large statistical and systematic uncertainties. The spectral analysis of larger star samples, like from the upcoming Gaia-ESO survey, may benefit from these findings.

  10. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  11. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2009-01-01

    The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink(reg s ign), an extension of MATLAB(reg s ign), is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub

  12. Consequence analysis

    International Nuclear Information System (INIS)

    Woodard, K.

    1985-01-01

    The objectives of this paper are to: Provide a realistic assessment of consequences; Account for plant and site-specific characteristics; Adjust accident release characteristics to account for results of plant-containment analysis; Produce conditional risk curves for each of five health effects; and Estimate uncertainties

  13. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  14. Prevalence and predictors of problematic alcohol use, risky sexual practices and other negative consequences associated with alcohol use among safety and security employees in the Western Cape, South Africa.

    Science.gov (United States)

    Harker Burnhams, Nadine; Parry, Charles; Laubscher, Ria; London, Leslie

    2014-03-04

    Harmful alcohol use can compromise worker health and productivity. Persons employed in safety-sensitive occupations are particularly vulnerable to hazardous alcohol use and its associated risks. This study describes the patterns of harmful alcohol use, related HIV risks and risk factors for the harmful use of alcohol among a sample of employees in South Africa working in the safety and security sector. A cross-sectional study that formed the baseline for a clustered randomized control trial was undertaken in 2011. A random sample of 325 employees employed within a safety and security sector of a local municipality in the Western Cape Province of South Africa participated in the study. Data were collected by means of an 18-page self-administered structured questionnaire and analyzed using SAS/STAT software version 9.2. For all significance testing, the F-statistic and p-values are reported. Three hundred and twenty-five employees were surveyed. Findings suggest that more than half (76.1%) of the 78.9% of participants who consumed alcohol engaged in binge drinking, with close to a quarter reporting a CAGE score greater than the cut-off of 2, indicating potentially hazardous drinking patterns. The study further found that employees who use alcohol are more likely to engage in risky sexual practices when under the influence. A favorable drinking climate (p safety-sensitive occupations at the workplace. It suggests that persons employed within such positions are at high risk for developing alcohol-related disorders and for contracting HIV. This study highlights the need for testing a comprehensive package of services designed to prevent hazardous alcohol use among safety and security employees.

  15. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  16. High porosity harzburgite and dunite channels for the transport of compositionally heterogeneous melts in the mantle: II. Geochemical consequences

    Science.gov (United States)

    Liang, Y.; Schiemenz, A.; Xia, Y.; Parmentier, E.

    2009-12-01

    In a companion numerical study [1], we explored the spatial distribution of high porosity harzburgite and dunite channels produced by reactive dissolution of orthopyroxene (opx) in an upwelling mantle column and identified a number of new features. In this study, we examine the geochemical consequences of channelized melt flow under the settings outlined in [1] with special attention to the transport of compositionally heterogeneous melts and their interactions with the surrounding peridotite matrix during melt migration in the mantle. Time-dependent transport equations for a trace element in the interstitial melt and solids that include advection, dispersion, and melt-rock reaction were solved in a 2-D upwelling column using the high-order numerical methods outlined in [1]. The melt and solid velocities were taken from the steady state or quasi-steady state solutions of [1]. In terms of trace element fractionation, the simulation domain can be divided into 4 distinct regions: (a) high porosity harzburgite channel, overlain by; (b) high porosity dunite channel; (c) low porosity compacting boundary layer surrounding the melt channels; and (d) inter-channel regions outside (c). In the limit of local chemical equilibrium, melting in region (d) is equivalent to batch melting, whereas melting and melt extraction in (c) is more close to fractional melting with the melt suction rate first increase from the bottom of the melting column to a maximum near the bottom of the dunite channel and then decrease upward in the compacting boundary layer. The melt composition in the high porosity harzburgite channel is similar to that produced by high-degree batch melting (up to opx exhaustion), whereas the melt composition in the dunite is a weighted average of the ultra-depleted melt from the harzburgite channel below, the expelled melt from the compacting boundary layer, and melt produced by opx dissolution along the sidewalls of the dunite channel. Compaction within the dunite

  17. Cardiovascular and metabolic consequences of the association between chronic stress and high-fat diet in rats.

    Science.gov (United States)

    Simas, Bruna B; Nunes, Everson A; Crestani, Carlos C; Speretta, Guilherme F

    2018-05-01

    Obesity and chronic stress are considered independent risk factors for the development of cardiovascular diseases and changes in autonomic system activity. However, the cardiovascular consequences induced by the association between high-fat diet (HFD) and chronic stress are not fully understood. We hypothesized that the association between HFD and exposure to a chronic variable stress (CVS) protocol for four weeks might exacerbate the cardiovascular and metabolic disturbances in rats when compared to these factors singly. To test this hypothesis, male Wistar rats were divided into four groups: control-standard chow diet (SD; n = 8); control-HFD (n = 8); CVS-SD (n = 8); and CVS-HFD (n = 8). The CVS consisted of repeated exposure of the rats to different inescapable and unpredictable stressors (restraint tress; damp sawdust, cold, swim stress and light cycle inversion). We evaluated cardiovascular function, autonomic activity, dietary intake, adiposity and metabolism. The HFD increased body weight, adiposity and blood glucose concentration (∼15%) in both control and CVS rats. The CVS-HFD rats showed decreased insulin sensitivity (25%) compared to CVS-SD rats. The control-HFD and CVS-HFD rats presented increased intrinsic heart rate (HR) values (∼8%). CVS increased cardiac sympathetic activity (∼65%) in both SD- and HFD-fed rats. The HFD increased basal HR (∼10%). Blood pressure and baroreflex analyzes showed no differences among the experimental groups. In conclusion, the present data indicate absence of interaction on autonomic imbalance evoked by either CVS or HFD. Additionally, HFD increased HR and evoked metabolic disruptions which are independent of stress exposure.

  18. Water sovereignty and security, high politics and hard power: the dangers of borrowing discourses!

    NARCIS (Netherlands)

    Gupta, J.; Dellapenna, J.W.; van den Heuvel, M.; Pahl-Wostl, C.; Bhaduri, A.; Gupta, J.

    2016-01-01

    This chapter argues that water security has many meanings. It addresses the question: will framing water in terms of ‘water security’ be likely to do a disservice to the water governance challenge of the 21st century? Isn’t there a real risk that the term will become hostage to a much more sinister

  19. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    Science.gov (United States)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. High reliability - low noise radionuclide signature identification algorithms for border security applications

    Science.gov (United States)

    Lee, Sangkyu

    Illicit trafficking and smuggling of radioactive materials and special nuclear materials (SNM) are considered as one of the most important recent global nuclear threats. Monitoring the transport and safety of radioisotopes and SNM are challenging due to their weak signals and easy shielding. Great efforts worldwide are focused at developing and improving the detection technologies and algorithms, for accurate and reliable detection of radioisotopes of interest in thus better securing the borders against nuclear threats. In general, radiation portal monitors enable detection of gamma and neutron emitting radioisotopes. Passive or active interrogation techniques, present and/or under the development, are all aimed at increasing accuracy, reliability, and in shortening the time of interrogation as well as the cost of the equipment. Equally important efforts are aimed at advancing algorithms to process the imaging data in an efficient manner providing reliable "readings" of the interiors of the examined volumes of various sizes, ranging from cargos to suitcases. The main objective of this thesis is to develop two synergistic algorithms with the goal to provide highly reliable - low noise identification of radioisotope signatures. These algorithms combine analysis of passive radioactive detection technique with active interrogation imaging techniques such as gamma radiography or muon tomography. One algorithm consists of gamma spectroscopy and cosmic muon tomography, and the other algorithm is based on gamma spectroscopy and gamma radiography. The purpose of fusing two detection methodologies per algorithm is to find both heavy-Z radioisotopes and shielding materials, since radionuclides can be identified with gamma spectroscopy, and shielding materials can be detected using muon tomography or gamma radiography. These combined algorithms are created and analyzed based on numerically generated images of various cargo sizes and materials. In summary, the three detection

  2. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  4. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  5. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  7. Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing.

    Science.gov (United States)

    Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A

    2017-11-01

    Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. A Common Criteria-Based Team Project for High Assurance Secure Systems

    Science.gov (United States)

    2005-01-01

    experience in the FHM, full system documentation, and plenty of time. The students had little experience and little time. The MINIX operating... MINIX is a very appropriate target for student enhancements. Since the principle objective of Secure Systems is to teach the concepts of...to construct a system when one of the developmental threats is subversion. Because students were studying MINIX in a prerequisite operating systems

  9. Perceived vulnerability moderates the relations between the use of protective behavioral strategies and alcohol use and consequences among high-risk young adults.

    Science.gov (United States)

    Garcia, Tracey A; Fairlie, Anne M; Litt, Dana M; Waldron, Katja A; Lewis, Melissa A

    2018-06-01

    Drinking protective behavioral strategies (PBS) have been associated with reductions in alcohol use and alcohol-related consequences in young adults. PBS subscales, Limiting/Stopping (LS), Manner of Drinking (MOD), and Serious Harm Reduction (SHR), have been examined in the literature; LS, MOD, and SHR have mixed support as protective factors. Understanding moderators between PBS and alcohol use and related consequences is an important development in PBS research in order to delineate when and for whom PBS use is effective in reducing harm from alcohol use. Perceptions of vulnerability to negative consequences, included in health-risk models, may be one such moderator. The current study examined whether two types of perceived vulnerability (perceived vulnerability when drinking; perceived vulnerability in uncomfortable/unfamiliar situations) moderated the relations between LS, MOD, SHR strategies and alcohol use and related negative consequences. High-risk young adults (N = 400; 53.75% female) recruited nationally completed measures of PBS, alcohol use and related consequences, and measures of perceived vulnerability. Findings demonstrated that perceived vulnerability when drinking moderated the relations between MOD strategies and alcohol use. The interactions between perceived vulnerability when drinking and PBS did not predict alcohol-related consequences. Perceived vulnerability in unfamiliar/uncomfortable social situations moderated relations between MOD strategies and both alcohol use and related negative consequences; no other significant interactions emerged. Across both perceived vulnerability types and MOD strategies, those with the highest levels of perceived vulnerability and who used MOD strategies the most had the greatest decrements in alcohol use and related negative consequences. Prevention and intervention implications are discussed. Copyright © 2018. Published by Elsevier Ltd.

  10. Holographic optical security systems

    Science.gov (United States)

    Fagan, William F.

    1990-06-01

    One of the most successful applications of Holography,in recent years,has been its use as an optical security technique.Indeed the general public's awareness of holograms has been greatly enhanced by the incorporation of holographic elements into the VISA and MASTERCHARGE credit cards.Optical techniques related to Holography,are also being used to protect the currencies of several countries against the counterfeiter. The mass production of high quality holographic images is by no means a trivial task as a considerable degree of expertise is required together with an optical laboratory and embossing machinery.This paper will present an overview of the principal holographic and related optical techniques used for security purposes.Worldwide, over thirty companies are involved in the production of security elements utilising holographic and related optical technologies.Counterfeiting of many products is a major criminal activity with severe consequences not only for the manufacturer but for the public in general as defective automobile parts,aircraft components,and pharmaceutical products, to cite only a few of the more prominent examples,have at one time or another been illegally copied.

  11. Constrained consequence

    CSIR Research Space (South Africa)

    Britz, K

    2011-09-01

    Full Text Available their basic properties and relationship. In Section 3 we present a modal instance of these constructions which also illustrates with an example how to reason abductively with constrained entailment in a causal or action oriented context. In Section 4 we... of models with the former approach, whereas in Section 3.3 we give an example illustrating ways in which C can be de ned with both. Here we employ the following versions of local consequence: De nition 3.4. Given a model M = hW;R;Vi and formulas...

  12. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  13. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  14. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  15. Choice & Consequence

    DEFF Research Database (Denmark)

    Khan, Azam

    to support hypothesis generation, hypothesis testing, and decision making. In addition to sensors in buildings, infrastructure, or the environment, we also propose the instrumentation of user interfaces to help measure performance in decision making applications. We show the benefits of applying principles...... between cause and effect in complex systems complicates decision making. To address this issue, we examine the central role that data-driven decision making could play in critical domains such as sustainability or medical treatment. We developed systems for exploratory data analysis and data visualization...... of data analysis and instructional interface design, to both simulation systems and decision support interfaces. We hope that projects such as these will help people to understand the link between their choices and the consequences of their decisions....

  16. Experimental realization of a highly secure chaos communication under strong channel noise

    International Nuclear Information System (INIS)

    Ye Weiping; Dai Qionglin; Wang Shihong; Lu Huaping; Kuang Jinyu; Zhao Zhenfeng; Zhu Xiangqing; Tang Guoning; Huang Ronghuai; Hu Gang

    2004-01-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work

  17. Experimental realization of a highly secure chaos communication under strong channel noise

    Science.gov (United States)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  18. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  19. Custom database development and biomarker discovery methods for MALDI-TOF mass spectrometry-based identification of high-consequence bacterial pathogens.

    Science.gov (United States)

    Tracz, Dobryan M; Tyler, Andrea D; Cunningham, Ian; Antonation, Kym S; Corbett, Cindi R

    2017-03-01

    A high-quality custom database of MALDI-TOF mass spectral profiles was developed with the goal of improving clinical diagnostic identification of high-consequence bacterial pathogens. A biomarker discovery method is presented for identifying and evaluating MALDI-TOF MS spectra to potentially differentiate biothreat bacteria from less-pathogenic near-neighbour species. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.

  20. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  1. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  2. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    Science.gov (United States)

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  3. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety

    Directory of Open Access Journals (Sweden)

    Kelsey A. Speed

    2017-10-01

    Full Text Available Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1 how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2 that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3 that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4 that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  4. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas; Ouverture des marches energetiques: consequences sur les missions de service public et de securite d'approvisionnement pour l'electricite et le gaz

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  5. The consequences of "Culture's consequences"

    DEFF Research Database (Denmark)

    Knudsen, Fabienne; Froholdt, Lisa Loloma

    2009-01-01

      In this article, it is claimed that research on cross-cultural crews is dominated by one specific understanding of the concept of culture, which is static, evenly distributed and context-independent. Such a conception of culture may bring some basic order while facing an unknown culture...... review of the theory of Geert Hofstede, the most renowned representative of this theoretical approach. The practical consequences of using such a concept of culture is then analysed by means of a critical review of an article applying Hofstede to cross-cultural crews in seafaring. Finally, alternative...... views on culture are presented. The aim of the article is, rather than to promote any specific theory, to reflect about diverse perspectives of cultural sense-making in cross-cultural encounters. Udgivelsesdato: Oktober...

  6. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  7. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  8. Security "high-tech" individual extra-light device mask 2.0: CAD/CAM evolution.

    Science.gov (United States)

    Ramieri, V; Vellone, V; Crimi, S; Cascone, P

    2017-06-01

    In 2008, we presented our security "high-tech" individual extra-light device mask (SHIELD), a protective shield based on the face cast of an injured soccer player that can be customised. It allows a shortened convalescent period, is comfortable, fits well, and allows the patient to continue to play at a professional level in their chosen sport or activity in the shortest time possible. It has been used often in both amateur and professional categories of many sports, and we now present an update. Copyright © 2017 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  9. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  10. and consequences

    Directory of Open Access Journals (Sweden)

    P. Athanasopoulou

    2011-01-01

    Full Text Available (a Purpose: The purpose of this research is to identify the types of CSR initiatives employed by sports organisations; their antecedents, and their consequences for the company and society. (b Design/methodology/approach: This study is exploratory in nature. Two detailed case studies were conducted involving the football team and the basketball team of one professional, premier league club in Greece and their CSR initiatives. Both teams have the same name, they belong to one of the most popular teams in Greece with a large fan population; have both competed in International Competitions (UEFA’s Champion League; Final Four of the European Tournament and have realised many CSR initiatives in the past. The case studies involved in depth, personal interviews of managers responsible for CSR in each team. Case study data was triangulated with documentation and search of published material concerning CSR actions. Data was analysed with content analysis. (c Findings: Both teams investigated have undertaken various CSR activities the last 5 years, the football team significantly more than the basketball team. Major factors that affect CSR activity include pressure from leagues; sponsors; local community, and global organisations; orientation towards fulfilling their duty to society, and team CSR strategy. Major benefits from CSR include relief of vulnerable groups and philanthropy as well as a better reputation for the firm; increase in fan base; and finding sponsors more easily due to the social profile of the team. However, those benefits are not measured in any way although both teams observe increase in tickets sold; web site traffic and TV viewing statistics after CSR activities. Finally, promotion of CSR is mainly done through web sites; press releases; newspapers, and word-of-mouth communications. (d Research limitations/implications: This study involves only two case studies and has limited generalisability. Future research can extend the

  11. High-risk versus low-risk football game weekends: differences in problem drinking and alcohol-related consequences on college campuses in the United States.

    Science.gov (United States)

    Champion, Heather; Blocker, Jill N; Buettner, Cynthia K; Martin, Barbara A; Parries, Maria; Mccoy, Thomas P; Mitra, Ananda; Andrews, David W; Rhodes, Scott D

    2009-01-01

    Collegiate football games provide multiple social opportunities for alcohol use by students over the course of the weekend. The goal of this study was to examine alcohol use and alcohol-related consequences on football game weekends to determine differences based on characteristics of the game. A random sample of students from two large, public universities in the United States completed a survey on the Sunday-Friday following a high-risk weekend (HRW, important, home game) and low-risk weekend (LRW, no home game or game of importance) (N = 3,238 total). The survey measured the number of days students drank (0-3) and got drunk (0-3) over the weekend and whether 1+ consequences were experienced due to one's own drinking (yes/no) and due to others' drinking (yes/no). Ordinal logistic regression analyses revealed greater odds of drinking alcohol (OR = 1.70, CI = 1.46-1.97) and getting drunk (OR = 1.49, CI = 1.27-1.76) on HRW versus LRW. Logistic regression analyses revealed greater odds of experiencing 1+ consequences as a result of one's own drinking (OR = 1.38, CI = 1.16-1.63) and experiencing 1+ consequences as a result of others' drinking (OR = 1.52, CI = 1.30-1.78) on HRW versus LRW. These findings suggest that additional prevention efforts aimed at reducing risky drinking are needed over HRW and have implications for campus administrators, law enforcement, and substance abuse program coordinators.

  12. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  13. Characteristics and Pathways of Long-Stay Patients in High and Medium Secure Settings in England; A Secondary Publication From a Large Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Birgit A. Völlm

    2018-04-01

    Full Text Available Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood.Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England.Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings.Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent, 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60% followed by personality disorder (47%, predominantly antisocial and borderline types; 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample.Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of

  14. Phenomenological consequences of supersymmetry

    International Nuclear Information System (INIS)

    Hinchliffe, I.; Littenberg, L.

    1982-01-01

    This paper deals with the phenomenological consequences of supersymmetric theories, and with the implications of such theories for future high energy machines. The paper represents the work of a subgroup at the meeting. The authors are concerned only with high energy predictions of supersymmetry; low energy consequences (for example in the K/sub o/K-bar/sub o/ system) are discussed in the context of future experiments by another group, and will be mentioned briefly only in the context of constraining existing models. However a brief section is included on the implication for proton decay, although detailed experimental questions are not discussed

  15. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  16. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  17. Low-Probability High-Consequence (LPHC) Failure Events in Geologic Carbon Sequestration Pipelines and Wells: Framework for LPHC Risk Assessment Incorporating Spatial Variability of Risk

    Energy Technology Data Exchange (ETDEWEB)

    Oldenburg, Curtis M. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Budnitz, Robert J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-08-31

    If Carbon dioxide Capture and Storage (CCS) is to be effective in mitigating climate change, it will need to be carried out on a very large scale. This will involve many thousands of miles of dedicated high-pressure pipelines in order to transport many millions of tonnes of CO2 annually, with the CO2 delivered to many thousands of wells that will inject the CO2 underground. The new CCS infrastructure could rival in size the current U.S. upstream natural gas pipeline and well infrastructure. This new infrastructure entails hazards for life, health, animals, the environment, and natural resources. Pipelines are known to rupture due to corrosion, from external forces such as impacts by vehicles or digging equipment, by defects in construction, or from the failure of valves and seals. Similarly, wells are vulnerable to catastrophic failure due to corrosion, cement degradation, or operational mistakes. While most accidents involving pipelines and wells will be minor, there is the inevitable possibility of accidents with very high consequences, especially to public health. The most important consequence of concern is CO2 release to the environment in concentrations sufficient to cause death by asphyxiation to nearby populations. Such accidents are thought to be very unlikely, but of course they cannot be excluded, even if major engineering effort is devoted (as it will be) to keeping their probability low and their consequences minimized. This project has developed a methodology for analyzing the risks of these rare but high-consequence accidents, using a step-by-step probabilistic methodology. A key difference between risks for pipelines and wells is that the former are spatially distributed along the pipe whereas the latter are confined to the vicinity of the well. Otherwise, the methodology we develop for risk assessment of pipeline and well failures is similar and provides an analysis both of the annual probabilities of

  18. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Smith, L.; Murphy, J.W. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Kim, J. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Rozhdestvenskyy, S.; Mejia, I. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Park, H. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Allee, D.R. [Flexible Display Center, Arizona State University, Phoenix, AZ 85284 (United States); Quevedo-Lopez, M. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Gnade, B., E-mail: beg031000@utdallas.edu [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States)

    2016-12-01

    Solid-state neutron detectors offer an alternative to {sup 3}He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10{sup −6} gamma-ray efficiency.

  19. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  20. Can everyone become highly intelligent? Cultural differences in and societal consequences of beliefs about the universal potential for intelligence.

    Science.gov (United States)

    Rattan, Aneeta; Savani, Krishna; Naidu, N V R; Dweck, Carol S

    2012-11-01

    We identify a novel dimension of people's beliefs about intelligence: beliefs about the potential to become highly intelligent. Studies 1-3 found that in U.S. American contexts, people tend to believe that only some people have the potential to become highly intelligent. In contrast, in South Asian Indian contexts, people tend to believe that most people have the potential to become highly intelligent. To examine the implications of these beliefs, Studies 4-6 measured and manipulated Americans' beliefs about the potential for intelligence and found that the belief that everyone can become highly intelligent predicted increased support for policies that distribute resources more equally across advantaged and disadvantaged social groups. These findings suggest that the belief that only some people have the potential to become highly intelligent is a culturally shaped belief, and one that can lead people to oppose policies aimed at redressing social inequality. (c) 2012 APA, all rights reserved.

  1. Natural gas market review 2008 - optimising investments and ensuring security in a high-priced environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-18

    Over the last 18 months, natural gas prices have continued to rise steadily in all IEA markets. What are the causes of this steady upward trend? Unprecedented oil and coal prices which have encouraged power generators to switch to gas, together with tight supplies, demand for gas in new markets and delayed investments all played a role. Investment uncertainties, cost increases and delays remain major concerns in most gas markets and are continuing to constitute a threat to long-term security of supply. A massive expansion in LNG production is expected in the short term to 2012, but the lag in LNG investment beyond 2012 is a concern for all gas users in both IEA and non-IEA markets. Despite this tight market context, regional markets continue on their way to globalisation. This tendency seems irreversible, and it impacts even the most independent markets. Price linkages and other interactions between markets are becoming more pronounced. This publication addresses these major developments, assessing investment in natural gas projects (LNG, pipelines, upstream), escalating costs, the activities of international oil and gas companies, and gas demand in the power sector. In addition, the publication includes data and forecasts on OECD and non-OECD regions to 2015 and in-depth reviews of five OECD countries and regions including the European Union. It also provides analysis of 34 non-OECD countries in South America, the Middle East, Africa, and Asia, including a detailed assessment of the outlook for gas in Russia, as well as insights on new technologies to deliver gas to markets.

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. Predictors of admission to a high-security hospital of people with intellectual disability with and without schizophrenia.

    Science.gov (United States)

    Doody, G A; Thomson, L D; Miller, P; Johnstone, E C

    2000-04-01

    reduction in the number of admissions to high-security hospitals in the UK. In people with comorbid intellectual disability and schizophrenia, males with an early age of onset and no known family history are more likely to require care and treatment in a secure psychiatric setting. Such comorbid subjects may be suffering from a particular malignant form of schizophrenia, manifesting in childhood as cognitive impairment prior to the early onset of psychosis in teenage years.

  4. Climate change consequences for terrestrial ecosystem processes in NW Greeland: Results from the High Arctic Biocomplexity project

    Science.gov (United States)

    Welker, J. M.; Sullivan, P.; Rogers, M.; Sharp, E. D.; Sletten, R.; Burnham, J. L.; Hallet, B.; Hagedorn, B.; Czimiczk, C.

    2009-12-01

    Greenland is experiencing some of the fastest rates of climate warming across the Arctic including warmer summers and increases in snow fall. The effects of these new states of Greenland are however, uncertain especially for carbon, nitrogen and water biogeochemical processes, soil traits, vegetation growth patterns, mineral nutrition and plant ecophysiological processes. Since 2003 we have conducted a suite of observational and experimental measurements that have been designed to understand the fundamental nature of polar desert, polar semi-desert and fen landscapes in NW Greenland. In addition, we have established a suite of experiments to ascertain ecosystem responses to warming at multiple levels (~2030 and 2050), in conjunction with added summer rain; the consequences of added snow fall (ambient, intermediate and deep) and the effects of increases in nutrient additions (added N, P and N+P), which represent extreme warming conditions. We find that: a) the soil C pools are 6-fold larger than previously measured, b) extremely old C (up to ~30k bp) which has been buried by frost cracking and frost heaving is reaching the modern atmosphere, but in only trace amounts as measured by respired 14CO2, c) warming that simulates 2030, has only a small effect on net C sequestration but warming that simulates 2050 when combined with added summer rain, increases C sequestration by 300%, d) increases in N deposition almost immediately and completely changes the vegetation composition of polar semi-deserts shifting the NDVI values from 0.2 to 0.5 within 2 years. Our findings depict a system that is poised to contribute stronger feedbacks than previously expected as climates in NW Greenland change.

  5. Proximity to a high traffic road: glucocorticoid and life history consequences for nestling white-crowned sparrows.

    Science.gov (United States)

    Crino, O L; Van Oorschot, B Klaassen; Johnson, E E; Malisch, J L; Breuner, C W

    2011-09-01

    Roads have been associated with decreased reproductive success and biodiversity in avian communities and increased physiological stress in adult birds. Alternatively, roads may also increase food availability and reduce predator pressure. Previous studies have focused on adult birds, but nestlings may also be susceptible to the detrimental impacts of roads. We examined the effects of proximity to a road on nestling glucocorticoid activity and growth in the mountain white-crowned sparrow (Zonotrichia leucophrys oriantha). Additionally, we examined several possible indirect factors that may influence nestling corticosterone (CORT) activity secretion in relation to roads. These indirect effects include parental CORT activity, nest-site characteristics, and parental provisioning. And finally, we assessed possible fitness consequences of roads through measures of fledging success. Nestlings near roads had increased CORT activity, elevated at both baseline and stress-induced levels. Surprisingly, these nestlings were also bigger. Generally, greater corticosterone activity is associated with reduced growth. However, the hypothalamic-pituitary-adrenal axis matures through the nestling period (as nestlings get larger, HPA-activation is greater). Although much of the variance in CORT responses was explained by body size, nestling CORT responses were higher close to roads after controlling for developmental differences. Indirect effects of roads may be mediated through paternal care. Nestling CORT responses were correlated with paternal CORT responses and paternal provisioning increased near roads. Hence, nestlings near roads may be larger due to increased paternal attentiveness. And finally, nest predation was higher for nests close to the road. Roads have apparent costs for white-crowned sparrow nestlings--increased predation, and apparent benefits--increased size. The elevation in CORT activity seems to reflect both increased size (benefit) and elevation due to road

  6. Envisioning Urban Farming for Food Security during the Climate Change Era. Vertical Farm within Highly Urbanized Areas

    Science.gov (United States)

    Januszkiewicz, Krystyna; Jarmusz, Małgorzata

    2017-10-01

    Global climate change constitutes a serious threat to global security including food production in the following decades. This paper is focused on a new possibility and advisability of creating a systemic solution to resolve the problem of food security in highly-urbanized areas. The first part of the paper deal with historical development vertical farms ideas and defines the main environmental and spatial constrains also it indicates that vertical farms are going to be part of the future horticultural production. The second part presents results of the research program undertaken at West Pomeranian University of Technology in Szczecin by authors. The program goes on to attempt to solve the problem through architectural design. This study highlights an integrating large-scale horticultural production directly into the cities, where the most of the food consumption takes place. In conclusions emphasizes, that the design will force architects, engineers and urban planners to completely revise and redefine contemporary design process and understanding of the idea-fix of sustainable design. To successfully migrate food production from extensive rural areas to dense environment of city centres, a new holistic approach, integrating knowledge and advances of multiple fields of science, have to develop.

  7. Consequences of exchanging carbohydrates for proteins in the cholesterol metabolism of mice fed a high-fat diet.

    Directory of Open Access Journals (Sweden)

    Frédéric Raymond

    Full Text Available Consumption of low-carbohydrate, high-protein, high-fat diets lead to rapid weight loss but the cardioprotective effects of these diets have been questioned. We examined the impact of high-protein and high-fat diets on cholesterol metabolism by comparing the plasma cholesterol and the expression of cholesterol biosynthesis genes in the liver of mice fed a high-fat (HF diet that has a high (H or a low (L protein-to-carbohydrate (P/C ratio. H-P/C-HF feeding, compared with L-P/C-HF feeding, decreased plasma total cholesterol and increased HDL cholesterol concentrations at 4-wk. Interestingly, the expression of genes involved in hepatic steroid biosynthesis responded to an increased dietary P/C ratio by first down-regulation (2-d followed by later up-regulation at 4-wk, and the temporal gene expression patterns were connected to the putative activity of SREBF1 and 2. In contrast, Cyp7a1, the gene responsible for the conversion of cholesterol to bile acids, was consistently up-regulated in the H-P/C-HF liver regardless of feeding duration. Over expression of Cyp7a1 after 2-d and 4-wk H-P/C-HF feeding was connected to two unique sets of transcription regulators. At both time points, up-regulation of the Cyp7a1 gene could be explained by enhanced activations and reduced suppressions of multiple transcription regulators. In conclusion, we demonstrated that the hypocholesterolemic effect of H-P/C-HF feeding coincided with orchestrated changes of gene expressions in lipid metabolic pathways in the liver of mice. Based on these results, we hypothesize that the cholesterol lowering effect of high-protein feeding is associated with enhanced bile acid production but clinical validation is warranted. (246 words.

  8. Consequences of exchanging carbohydrates for proteins in the cholesterol metabolism of mice fed a high-fat diet.

    Science.gov (United States)

    Raymond, Frédéric; Wang, Long; Moser, Mireille; Metairon, Sylviane; Mansourian, Robert; Zwahlen, Marie-Camille; Kussmann, Martin; Fuerholz, Andreas; Macé, Katherine; Chou, Chieh Jason

    2012-01-01

    Consumption of low-carbohydrate, high-protein, high-fat diets lead to rapid weight loss but the cardioprotective effects of these diets have been questioned. We examined the impact of high-protein and high-fat diets on cholesterol metabolism by comparing the plasma cholesterol and the expression of cholesterol biosynthesis genes in the liver of mice fed a high-fat (HF) diet that has a high (H) or a low (L) protein-to-carbohydrate (P/C) ratio. H-P/C-HF feeding, compared with L-P/C-HF feeding, decreased plasma total cholesterol and increased HDL cholesterol concentrations at 4-wk. Interestingly, the expression of genes involved in hepatic steroid biosynthesis responded to an increased dietary P/C ratio by first down-regulation (2-d) followed by later up-regulation at 4-wk, and the temporal gene expression patterns were connected to the putative activity of SREBF1 and 2. In contrast, Cyp7a1, the gene responsible for the conversion of cholesterol to bile acids, was consistently up-regulated in the H-P/C-HF liver regardless of feeding duration. Over expression of Cyp7a1 after 2-d and 4-wk H-P/C-HF feeding was connected to two unique sets of transcription regulators. At both time points, up-regulation of the Cyp7a1 gene could be explained by enhanced activations and reduced suppressions of multiple transcription regulators. In conclusion, we demonstrated that the hypocholesterolemic effect of H-P/C-HF feeding coincided with orchestrated changes of gene expressions in lipid metabolic pathways in the liver of mice. Based on these results, we hypothesize that the cholesterol lowering effect of high-protein feeding is associated with enhanced bile acid production but clinical validation is warranted. (246 words).

  9. Formulating a strategy for securing high-speed rail in the United States.

    Science.gov (United States)

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Location iron-Mantua an area with high securities gives natural radioactivity

    International Nuclear Information System (INIS)

    Alcaide Orpi, J.; Oliveira Acosta, J.; Valdes Hernadez, G.M.; Leal Ramirez, M.R.; Blanco Jorrin, N.

    1998-01-01

    The work shows the high natural radioactivity and the concentration to the natural radioelements (U,Th, Ra, K) it is exists in the sulfurous Hierro Mantua location. The objective is to know the possible radiological risk to that would be subjected the workers during the mining exploitation, because the high gamma radiation doses that could receive and to the risks product the internal contamination due to the inhalation the radon 222 and uranium aerosols and particles

  13. When do ego threats lead to self-regulation failure? Negative consequences of defensive high self-esteem.

    Science.gov (United States)

    Lambird, Kathleen Hoffman; Mann, Traci

    2006-09-01

    High self-esteem (HSE) is increasingly recognized as heterogeneous. By measuring subtypes of HSE, the present research reevaluates the finding that HSE individuals show poor self-regulation following ego threat (Baumeister, Heatherton, & Tice, 1993). In Experiment 1, participants with HSE showed poor self-regulation after ego threat only if they also were defensive (high in self-presentation bias). In Experiment 2, two measures--self-presentation bias and implicit self-esteem--were used to subtype HSE individuals as defensive. Both operationalizations of defensive HSE predicted poor self-regulation after ego threat. The results indicate that (a) only defensive HSE individuals are prone to self-regulation failure following ego threat and (b) measures of self-presentation bias and implicit self-esteem can both be used to detect defensiveness.

  14. Noble gases in basalt glasses from a Mid-Atlantic Ridge topographic high at 14deg N - geodynamic consequences

    International Nuclear Information System (INIS)

    Staudacher, T.; Sarda, P.; Richardson, S.H.; Allegre, C.J.; Sagna, I.; Dmitriev, L.V.

    1989-01-01

    We present a complete noble gas study of mid-oceanic ridge basalt glasses (MORB) from a small ridge segment, centered on an along-strike topographic elevation of the Mid-Atlantic Ridge at about 14deg N. We have found the highest 40 Ar/ 36 Ar ratio ever observed for a MORB glass, i.e. 28,150±330 for sample 2ΠD40, correlated with high 129 Xe/ 130 Xe ratios and the highest noble gas concentrations in a so-called popping-rock, labeled 2ΠD43. The latter sample displays a 4 He/ 40 Ar * ratio of 2.0-2.7, which is close to the production ratio in the mantle due to the radioactive decay of U, Th and K. Hence, this sample probably best represents the elemental noble gas ratios in the mantle, from which we have computed the 4 He concentration in the mantle source of MORB to be 1.5x10 -5 cm 3 STP g -1 . High 4 He/ 3 He ratios in two of the samples from the summit of the topographic high indicate the presence of a U, Th-rich component in the mantle source, possibly old subducted oceanic crust and/or sediments, which could originate in the so-called mesosphere boundary layer. (orig.)

  15. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  16. SECURITY ANALYSIS OF ONE SOLUTION FOR SECURE PRIVATE DATA STORAGE IN A CLOUD

    Directory of Open Access Journals (Sweden)

    Ludmila Klimentievna Babenko

    2016-03-01

    Full Text Available The paper analyzes the security of one recently proposed secure cloud data base architecture. We present an attack on it binding the security of whole solution with the security of particular encryption schemes, used in it. We show this architecture is vulnerable and consequently the solution is unviable.

  17. SECURITY ANALYSIS OF ONE SOLUTION FOR SECURE PRIVATE DATA STORAGE IN A CLOUD

    OpenAIRE

    Ludmila Klimentievna Babenko; Alina Viktorovna Trepacheva

    2016-01-01

    The paper analyzes the security of one recently proposed secure cloud data base architecture. We present an attack on it binding the security of whole solution with the security of particular encryption schemes, used in it. We show this architecture is vulnerable and consequently the solution is unviable.

  18. Myeloid-specific deletion of NOX2 prevents the metabolic and neurologic consequences of high fat diet.

    Directory of Open Access Journals (Sweden)

    Jennifer K Pepping

    Full Text Available High fat diet-induced obesity is associated with inflammatory and oxidative signaling in macrophages that likely participates in metabolic and physiologic impairment. One key factor that could drive pathologic changes in macrophages is the pro-inflammatory, pro-oxidant enzyme NADPH oxidase. However, NADPH oxidase is a pleiotropic enzyme with both pathologic and physiologic functions, ruling out indiscriminant NADPH oxidase inhibition as a viable therapy. To determine if targeted inhibition of monocyte/macrophage NADPH oxidase could mitigate obesity pathology, we generated mice that lack the NADPH oxidase catalytic subunit NOX2 in myeloid lineage cells. C57Bl/6 control (NOX2-FL and myeloid-deficient NOX2 (mNOX2-KO mice were given high fat diet for 16 weeks, and subject to comprehensive metabolic, behavioral, and biochemical analyses. Data show that mNOX2-KO mice had lower body weight, delayed adiposity, attenuated visceral inflammation, and decreased macrophage infiltration and cell injury in visceral adipose relative to control NOX2-FL mice. Moreover, the effects of high fat diet on glucose regulation and circulating lipids were attenuated in mNOX2-KO mice. Finally, memory was impaired and markers of brain injury increased in NOX2-FL, but not mNOX2-KO mice. Collectively, these data indicate that NOX2 signaling in macrophages participates in the pathogenesis of obesity, and reinforce a key role for macrophage inflammation in diet-induced metabolic and neurologic decline. Development of macrophage/immune-specific NOX-based therapies could thus potentially be used to preserve metabolic and neurologic function in the context of obesity.

  19. On the counterintuitive consequences of high-performance work practices in cross-border post-merger human integration

    DEFF Research Database (Denmark)

    Vasilaki, A.; Smith, Pernille; Giangreco, A.

    2012-01-01

    , such as communication, employee involvement, and team building, may not always produce the expected effects on human integration; rather, it can have the opposite effects if top management does not closely monitor the immediate results of deploying such practices. Implications for managers dealing with post......, this article investigates the impact of systemic and integrated human resource practices [i.e., high-performance work practices (HPWPs)] on human integration and how their implementation affects employees' behaviours and attitudes towards post-merger human integration. We find that the implementation of HPWPs...

  20. The behavioral and health consequences of sleep deprivation among U.S. high school students: relative deprivation matters.

    Science.gov (United States)

    Meldrum, Ryan Charles; Restivo, Emily

    2014-06-01

    To evaluate whether the strength of the association between sleep deprivation and negative behavioral and health outcomes varies according to the relative amount of sleep deprivation experienced by adolescents. 2011 Youth Risk Behavior Survey data of high school students (N=15,364) were analyzed. Associations were examined on weighted data using logistic regression. Twelve outcomes were examined, ranging from weapon carrying to obesity. The primary independent variable was a self-reported measure of average number of hours slept on school nights. Participants who reported deprivations in sleep were at an increased risk of a number of negative outcomes. However, this varied considerably across different degrees of sleep deprivation. For each of the outcomes considered, those who slept less than 5h were more likely to report negative outcomes (adjusted odds ratios ranging from 1.38 to 2.72; psleeping 8 or more hours. However, less extreme forms of sleep deprivation were, in many instances, unrelated to the outcomes considered. Among U.S. high school students, deficits in sleep are significantly and substantively associated with a variety of negative outcomes, and this association is particularly pronounced for students achieving fewer than 5h of sleep at night. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Radiological assessment of the consequences of the disposal of high-level radioactive waste in subseabed sediments

    International Nuclear Information System (INIS)

    de Marsily, G.; Behrendt, V.; Ensminger, D.A.

    1987-01-01

    The radiological assessment of the seabed option consists in estimating the detriment to man and to the environment that could result from the disposal of high-level waste (HLW) within the seabed sediments in deep oceans. The assessment is made for the high-level waste (vitrified glass) produced by the reprocessing of 10 5 tons of heavy metal from spent fuel, which represents the amount of waste generated by 3333 reactor-yr of 900-MW(electric) reactors, i.e., 3000 GW(electric) x yr. The disposal option considered is to use 14,667 steel penetrators, each of them containing five canisters of HLW glass (0.15 m 3 each). These penetrators would reach a depth of 50 m in the sediments and would be placed at an average distance of 180 m from each other, requiring a disposal area on the order of 22 x 22 km. Two such potential disposal areas in the Atlantic Ocean were studied, Great Meteor East (GME) and South Nares Abyssal Plains (SNAP). A special ship design is proposed to minimize transportation accidents. Approximately 100 shipments would be necessary to dispose of the proposed amount of waste. The results of this radiological assessment seem to show that the disposal of HLW in subseabed sediments is radiologically a very acceptable option

  2. The health of homeless people in high-income countries: descriptive epidemiology, health consequences, and clinical and policy recommendations

    Science.gov (United States)

    Fazel, Seena; Geddes, John R; Kushel, Margot

    2015-01-01

    In the European Union, more than 400 000 individuals are homeless on any one night and more than 600 000 are homeless in the USA. The causes of homelessness are an interaction between individual and structural factors. Individual factors include poverty, family problems, and mental health and substance misuse problems. The availability of low-cost housing is thought to be the most important structural determinant for homelessness. Homeless people have higher rates of premature mortality than the rest of the population, especially from suicide and unintentional injuries, and an increased prevalence of a range of infectious diseases, mental disorders, and substance misuse. High rates of non-communicable diseases have also been described with evidence of accelerated ageing. Although engagement with health services and adherence to treatments is often compromised, homeless people typically attend the emergency department more often than non-homeless people. We discuss several recommendations to improve the surveillance of morbidity and mortality in homeless people. Programmes focused on high-risk groups, such as individuals leaving prisons, psychiatric hospitals, and the child welfare system, and the introduction of national and state-wide plans that target homeless people are likely to improve outcomes. PMID:25390578

  3. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sabrina Boubiche

    2016-04-01

    Full Text Available Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  4. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  5. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  6. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  7. Information Security for Compliance with Select Agent Regulations

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  8. Information security for compliance with select agent regulations.

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  9. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2010-01-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  10. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  11. High levels of intravenous mephedrone (4-methylmethcathinone) self-administration in rats: neural consequences and comparison with methamphetamine.

    Science.gov (United States)

    Motbey, Craig P; Clemens, Kelly J; Apetz, Nadine; Winstock, Adam R; Ramsey, John; Li, Kong M; Wyatt, Naomi; Callaghan, Paul D; Bowen, Michael T; Cornish, Jennifer L; McGregor, Iain S

    2013-09-01

    Mephedrone (MMC) is a relatively new recreational drug that has rapidly increased in popularity in recent years. This study explored the characteristics of intravenous MMC self-administration in the rat, with methamphetamine (METH) used as a comparator drug. Male Sprague-Dawley rats were trained to nose poke for intravenous MMC or METH in daily 2 h sessions over a 10 d acquisition period. Dose-response functions were then established under fixed- and progressive-ratio (FR and PR) schedules over three subsequent weeks of testing. Brains were analyzed ex vivo for striatal serotonin (5-HT) and dopamine (DA) levels and metabolites, while autoradiography assessed changes in the regional density of 5-HT and serotonin transporter (SERT) and DA transporter (DAT) and induction of the inflammation marker translocator protein (TSPO). Results showed that MMC was readily and vigorously self-administered via the intravenous route. Under a FR1 schedule, peak responding for MMC was obtained at 0.1 mg/kg/infusion, versus 0.01 mg/kg/infusion for METH. Break points under a PR schedule peaked at 1 mg/kg/infusion MMC versus 0.3 mg/kg/infusion for METH. Final intakes of MMC were 31.3 mg/kg/d compared to 4 mg/kg/d for METH. Rats self-administering MMC, but not METH, gained weight at a slower rate than control rats. METH, but not MMC, self-administration elevated TSPO receptor density in the nucleus accumbens and hippocampus, while MMC, but not METH, self-administration decreased striatal 5-hydroxyindolacetic acid (5-HIAA) concentrations. In summary, MMC supported high levels of self-administration, matching or exceeding those previously reported with other drugs of abuse.

  12. Design of High-Fidelity Testing Framework for Secure Electric Grid Control

    Energy Technology Data Exchange (ETDEWEB)

    Yoginath, Srikanth B [ORNL; Perumalla, Kalyan S [ORNL

    2014-01-01

    A solution methodology and implementation components are presented that can uncover unwanted, unintentional or unanticipated effects on electric grids from changes to actual electric grid control software. A new design is presented to leapfrog over the limitations of current modeling and testing techniques for cyber technologies in electric grids. We design a fully virtualized approach in which actual, unmodified operational software under test is enabled to interact with simulated surrogates of electric grids. It enables the software to influence the (simulated) grid operation and vice versa in a controlled, high fidelity environment. Challenges in achieving such capability include achieving low-overhead time control mechanisms in hypervisor schedulers, network capture and time-stamping, translation of network packets emanating from grid software into discrete events of virtual grid models, translation back from virtual sensors/actuators into data packets to control software, and transplanting the entire system onto an accurately and efficiently maintained virtual-time plane.

  13. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  14. Securing energy efficiency as a high priority. Scenarios for common appliance electricity consumption in Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Foran, T. [Unit for Social and Environmental Research USER, Faculty of Social Sciences, Chiang Mai University, P.O. Box 144, Chiang Mai, 50200 (Thailand); Du Pont, P.T. [International Resources Group and Joint Graduate School of Energy and Environment, Bangkok (Thailand); Parinya, P. [The Joint Graduate School of Energy and Environment, King Mongkut' s University of Technology Thonburi, Bangkok (Thailand); Phumaraphand, N. [Electricity Generating Authority of Thailand, Nonthaburi (Thailand)

    2010-11-15

    Between 1995 and 2008, Thailand's energy efficiency programs produced an estimated total of 8,369 GWh/year energy savings and 1,471 MW avoided peak power. Despite these impressive saving figures, relatively little future scenario analysis is available to policy makers. Before the 2008 global financial crisis, electricity planners forecasted 5-6% long-term increases in demand. We explored options for efficiency improvements in Thailand's residential sector, which consumes more than 20% of Thailand's total electricity consumption of 150 TWh/year. We constructed baseline and efficient scenarios for the period 2006-2026, for air conditioners, refrigerators, fans, rice cookers, and compact fluorescent light bulbs. We drew on an appliance database maintained by Electricity Generating Authority of Thailand's voluntary labeling program. For the five appliances modeled, the efficiency scenario results in total savings of 12% of baseline consumption after 10 years and 29% of baseline after 20 years. Approximately 80% of savings come from more stringent standards for air conditioners, including phasing out unregulated air conditioner sales within 6 years. Shifting appliance efficiency standards to current best-in-market levels within 6 years produces additional savings. We discuss institutional aspects of energy planning in Thailand that thus far have limited the consideration of energy efficiency as a high-priority resource.

  15. Psychotropic prescribing in seriously violent men with schizophrenia or personality disorder in a UK high security hospital.

    Science.gov (United States)

    Stone-Brown, Keir; Naji, Mahmood; Francioni, Alex; Myers, Kyle; Samarendra, Harsh; Mushtaq-Chaudhry, Haseeb; Heslop, Stephen; Sengupta, Samrat; Ross, Callum C; Larkin, Fintan; Das, Mrigendra

    2016-02-01

    To analyze antipsychotic prescribing patterns in a UK high security hospital (HSH) that treats seriously violent men with either schizophrenia or personality disorder and examine how different groups consented to treatment and prescribing for metabolic conditions. We hypothesized that there would be high prevalence of antipsychotic polypharmacy, and high-dose antipsychotic and clozapine prescribing. HSHs treat seriously violent, mentally disordered offenders, and the extant literature on prescribing patterns in forensic settings is sparse. Prescribing and clinical data on all 189 patients in a UK HSH were collected from the hospital's databases. Data were analyzed using SPSS. The population was split into the following groups: schizophrenia spectrum disorder (SSD-only), personality disorder (PD-only), and comorbid schizophrenia spectrum disorder and PD. The majority (93.7%) of all patients were prescribed at least one antipsychotic, and (27.5%) were on clozapine. Polypharmacy was prevalent in 22.2% and high-dose antipsychotic in 27.5%. Patients on clozapine were more likely to be prescribed antidiabetic, statins, or antihypertensive medication. Patients in the PD-only group were more likely to be deemed to have the capacity to consent to treatment and be prescribed clozapine in contrast to the SSD-only group. Rates of clozapine and high-dose antipsychotic prescribing were higher than in other psychiatric settings, while polypharmacy prescribing rates were lower. Higher clozapine prescribing rates may be a function of a treatment-resistant and aggressive population. A higher proportion of PD-only patients consented to treatment and received clozapine compared with in-house SSD-only as well as other psychiatric settings. Implications of the findings are discussed.

  16. Investigation of radiological consequences of a serious accident in Swiss nuclear power plants on the drinking water supply and preventive measures in waterworks for securing drinking water quality and supply; Untersuchungen zu radiologischen Folgen schwerer Unfaelle in schweizerischen Kernkraftwerken auf die Trinkwasserversorgung und vorbeugende Massnahmen im Wasserwerk zur Absicherung der Trinkwasserqualitaet und -versorgung

    Energy Technology Data Exchange (ETDEWEB)

    Ustohalova, V.; Kueppers, C.; Claus, M. [Oeko-Institut e.V., Darmstadt (Germany)

    2016-07-01

    The radiological consequences of a serious accident in Swiss nuclear power plants on the drinking water supply was studied, preventive measures for securing the drinking water quality were elaborated. Based on the scaling of thermal power and burnup of the used nuclear fuel the fission product release in case of a severe accident was estimated for airborne and waterborne migration paths. In cities that use the rivers for their water drinking water supplies have to stop the water abstraction. The Swiss tolerance and limiting values for radionuclides in drinking water would be exceeded shortly after the accident and the hazardous situation would last for more than 90 days.

  17. Prevalence and correlates of latent tuberculosis infection among employees of a high security prison in Malaysia.

    Science.gov (United States)

    Al-Darraji, Haider Abdulrazzaq Abed; Tan, Cynthia; Kamarulzaman, Adeeba; Altice, Frederick L

    2015-06-01

    Although prison employees share the same tuberculosis (TB) risk environment with prisoners, the magnitude of TB problems among prison employees is unknown in most resource-limited prisons. This survey was conducted to investigate the prevalence and correlates of tuberculin skin test (TST) positivity among employees in Malaysia's largest prison. Consented, full-time prison employees were interviewed using a structured questionnaire that included sociodemographic data, history of working in the correctional system and TB-related risk. TST was placed intradermally and read after 48-72 h. Induration size of ≥10 mm was considered positive. Logistic regression analyses were conducted to explore associations with TST positivity. Of the 445 recruited prison employees, 420 (94.4%) had complete data. Most were young (median=30.0 years) men (88.8%) who had only worked at this prison (76.4%) for a median total employment period of 60 months (IQR 34.5-132.0). The majority were correctional officers, while civilian employees represented only 7.6% of the sample. Only 26 (6.2%) reported having ever been screened for TB since employment. Prevalence of TST positivity was 81% and was independently associated with longer (≥12 months) prison employment (AOR 4.9; 95% CI 1.5 to 15.9) and current tobacco smoking (AOR=1.9, 95% CI 1.2 to 3.2). Latent TB prevalence was high in this sample, approximating that of prisoners in this setting, perhaps suggesting within prison TB transmission in this facility. Formal TB control programmes for personnel and prisoners alike are urgently needed within the Malaysian correctional system. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  18. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  19. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  20. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  1. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Consequences of long-term power outages and high electricity prices lasting for months; Konsekvenser av langvarige stroemutfall og hoeye kraftpriser i flere maaneder

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Several areas in the world have experienced electricity outages for longer periods of time, but the consequences of these are sparsely documented. There is a need for further analysis of the socioeconomic consequences of the outages. In addition to KILE (Quality adjusted revenue framework for un supplied energy) costs one has to take into account that the costs often increase proportionally with the durance of the outage, and that KILE tariffs do not reflect lost consumer's surplus for products that are not produced during an outage. A good example is the public underground transport, where the company's economical loss can be significantly smaller than the loss of utility value for the travellers. If the authorities act with reasonability it is difficult to see that periods with very high prices represent a big problem. The most important problems are related to diffused effects, especially for households with a weak economy. These problems can be solved with improved contractual forms (price guarantees) or by transfers to the households, without weakening the incentives for electricity economising (ml)

  4. It Security and EO Systems

    Science.gov (United States)

    Burnett, M.

    2010-12-01

    One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.

  5. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  6. High security container

    International Nuclear Information System (INIS)

    Moreau, P.J.-M.; Monsterleet, G.A.

    1979-01-01

    This invention concerns containments, vessels or tanks for containing and protecting products or installations of various kinds, to be called by the general denomination 'containers'. Such products can be, inter alia, liquids such as natural gas, ammonia, vinyle chloride and hydrocarbons. Far from just forming simple means of storage, the containers used for this must now be capable of withstanding fire, sabotage for instance rocket fire, even impacts from aircraft, earthquakes and other aggressions of the same kind. The particular object of this invention is to create a container withstanding all these various agressions. It must also be considered that this container can not only be used for storing products or materials but also for enclosing particularly dangerous or delicate installations, such as nuclear or chemical reactors [fr

  7. High Fidelity Down-Conversion Source for Secure Communications using On-Demand Single Photons, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To provide reliably secure communications, development of quantum optical devices for encrypted ground-to-space communications is a necessity. The overall goal of...

  8. Phenomenological consequences of supersymmetry

    International Nuclear Information System (INIS)

    Hinchliffe, I.; Littenberg, L.

    1982-01-01

    This report deals with the phenomenological consequences of supersymmetric theories, and with the implications of such theories for future high energy machines. It is concerned only with high energy predictions of supersymmetry; low energy consequences (for example in the K/sub o/anti K/sub o/ system) are discussed in the context of future experiments by another group, and will be mentioned briefly only in the context of constraining existing models. However a brief section is included on the implication for proton decay, although detailed experimental questions are not discussed. The report is organized as follows. Section I consists of a brief review of supersymmetry and the salient features of existing supersymmetric models; this section can be ignored by those familiar with such models since it contains nothing new. Section 2 deals with the consequences for nucleon decay of SUSY. The remaining sections then discuss the physics possibilities of various machines; e anti e in Section 3, ep in Section 4, pp (or anti pp) colliders in Section 5 and fixed target hadron machines in Section 6

  9. Failure to Respond to Food Resource Decline Has Catastrophic Consequences for Koalas in a High-Density Population in Southern Australia.

    Directory of Open Access Journals (Sweden)

    Desley A Whisson

    Full Text Available Understanding the ability of koalas to respond to changes in their environment is critical for conservation of the species and their habitat. We monitored the behavioural response of koalas to declining food resources in manna gum (Eucalyptus viminalis woodland at Cape Otway, Victoria, Australia, from September 2011 to November 2013. Over this period, koala population density increased from 10.1 to 18.4 koalas.ha-1. As a result of the high browsing pressure of this population, manna gum canopy condition declined with 71.4% manna gum being completely or highly defoliated in September 2013. Despite declining food resources, radio collared koalas (N = 30 exhibited high fidelity to small ranges (0.4-1.2 ha. When trees became severely defoliated in September 2013, koalas moved relatively short distances from their former ranges (mean predicted change in range centroid = 144 m and remained in areas of 0.9 to 1.0 ha. This was despite the high connectivity of most manna gum woodland, and close proximity of the study site (< 3 km to the contiguous mixed forest of the Great Otway National Park. Limited movement had catastrophic consequences for koalas with 71% (15/21 of radio collared koalas dying from starvation or being euthanased due to their poor condition between September and November 2013.

  10. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  11. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  12. An examination of the causes, consequences, and policy responses to the migration of highly trained health personnel from the Philippines: the high cost of living/leaving-a mixed method study.

    Science.gov (United States)

    Castro-Palaganas, Erlinda; Spitzer, Denise L; Kabamalan, Maria Midea M; Sanchez, Marian C; Caricativo, Ruel; Runnels, Vivien; Labonté, Ronald; Murphy, Gail Tomblin; Bourgeault, Ivy Lynn

    2017-03-31

    Dramatic increases in the migration of human resources for health (HRH) from developing countries like the Philippines can have consequences on the sustainability of health systems. In this paper, we trace the outflows of HRH from the Philippines, map out its key causes and consequences, and identify relevant policy responses. This mixed method study employed a decentered, comparative approach that involved three phases: (a) a scoping review on health workers' migration of relevant policy documents and academic literature on health workers' migration from the Philippines; and primary data collection with (b) 37 key stakeholders and (c) household surveys with seven doctors, 329 nurses, 66 midwives, and 18 physical therapists. Filipino health worker migration is best understood within the context of macro-, meso-, and micro-level factors that are situated within the political, economic, and historical/colonial legacy of the country. Underfunding of the health system and un- or underemployment were push factors for migration, as were concerns for security in the Philippines, the ability to practice to full scope or to have opportunities for career advancement. The migration of health workers has both negative and positive consequences for the Philippine health system and its health workers. Stakeholders focused on issues such as on brain drain, gain, and circulation, and on opportunities for knowledge and technology transfer. Concomitantly, migration has resulted in the loss of investment in human capital. The gap in the supply of health workers has affected the quality of care delivered, especially in rural areas. The opening of overseas opportunities has commercialized health education, compromised its quality, and stripped the country of skilled learning facilitators. The social cost of migration has affected émigrés and their families. At the household level, migration has engendered increased consumerism and materialism and fostered dependency on overseas

  13. High feather mercury concentrations in the wandering albatross are related to sex, breeding status and trophic ecology with no demographic consequences

    Energy Technology Data Exchange (ETDEWEB)

    Bustamante, Paco, E-mail: pbustama@univ-lr.fr [Littoral Environnement et Sociétés (LIENSs), UMR 7266 CNRS-Université de la Rochelle, 2 rue Olympe de Gouges, 17000 La Rochelle (France); Carravieri, Alice [Littoral Environnement et Sociétés (LIENSs), UMR 7266 CNRS-Université de la Rochelle, 2 rue Olympe de Gouges, 17000 La Rochelle (France); Centre d’Etudes Biologiques de Chizé (CEBC), UMR 7372 du Centre National de la Recherche Scientifique-Université de La Rochelle, 79360 Villiers-en-Bois (France); Goutte, Aurélie [Centre d’Etudes Biologiques de Chizé (CEBC), UMR 7372 du Centre National de la Recherche Scientifique-Université de La Rochelle, 79360 Villiers-en-Bois (France); École Pratique des Hautes Études (EPHE), SPL, UPMC Université Paris 06, UMR 7619 METIS, F-75005, 4 place Jussieu, Paris (France); Barbraud, Christophe; Delord, Karine; Chastel, Olivier; Weimerskirch, Henri; Cherel, Yves [Centre d’Etudes Biologiques de Chizé (CEBC), UMR 7372 du Centre National de la Recherche Scientifique-Université de La Rochelle, 79360 Villiers-en-Bois (France)

    2016-01-15

    Hg can affect physiology of seabirds and ultimately their demography, particularly if they are top consumers. In the present study, body feathers of >200 wandering albatrosses from Possession Island in the Crozet archipelago were used to explore the potential demographic effects of the long-term exposure to Hg on an apex predator. Variations of Hg with sex, age class, foraging habitat (inferred from δ{sup 13}C values), and feeding habits (inferred from δ{sup 15}N values) were examined as well as the influence of Hg on current breeding output, long-term fecundity and survival. Wandering albatrosses displayed among the highest Hg feather concentrations reported for seabirds, ranging from 5.9 to 95 µg g{sup −1}, as a consequence of their high trophic position (δ{sup 15}N values). These concentrations fall within the same range of those of other wandering albatross populations from subantarctic sites, suggesting that this species has similar exposure to Hg all around the Southern Ocean. In both immature and adult albatrosses, females had higher Hg concentrations than males (28 vs. 20 µg g{sup −1} dw on average, respectively), probably as a consequence of females foraging at lower latitudes than males (δ{sup 13}C values). Hg concentrations were higher in immature than in adult birds, and they remained fairly constant across a wide range of ages in adults. Such high levels in immature individuals question (i) the frequency of moult in young birds, (ii) the efficiency of Hg detoxification processes in immatures compared to adults, and (iii) importantly the potential detrimental effects of Hg in early life. Despite very high Hg concentrations in their feathers, neither effects on adults' breeding probability, hatching failure and fledgling failure, nor on adults' survival rate were detected, suggesting that long-term bioaccumulated Hg was not under a chemical form leading to deleterious effects on reproductive parameters in adult individuals

  14. High feather mercury concentrations in the wandering albatross are related to sex, breeding status and trophic ecology with no demographic consequences

    International Nuclear Information System (INIS)

    Bustamante, Paco; Carravieri, Alice; Goutte, Aurélie; Barbraud, Christophe; Delord, Karine; Chastel, Olivier; Weimerskirch, Henri; Cherel, Yves

    2016-01-01

    Hg can affect physiology of seabirds and ultimately their demography, particularly if they are top consumers. In the present study, body feathers of >200 wandering albatrosses from Possession Island in the Crozet archipelago were used to explore the potential demographic effects of the long-term exposure to Hg on an apex predator. Variations of Hg with sex, age class, foraging habitat (inferred from δ 13 C values), and feeding habits (inferred from δ 15 N values) were examined as well as the influence of Hg on current breeding output, long-term fecundity and survival. Wandering albatrosses displayed among the highest Hg feather concentrations reported for seabirds, ranging from 5.9 to 95 µg g −1 , as a consequence of their high trophic position (δ 15 N values). These concentrations fall within the same range of those of other wandering albatross populations from subantarctic sites, suggesting that this species has similar exposure to Hg all around the Southern Ocean. In both immature and adult albatrosses, females had higher Hg concentrations than males (28 vs. 20 µg g −1 dw on average, respectively), probably as a consequence of females foraging at lower latitudes than males (δ 13 C values). Hg concentrations were higher in immature than in adult birds, and they remained fairly constant across a wide range of ages in adults. Such high levels in immature individuals question (i) the frequency of moult in young birds, (ii) the efficiency of Hg detoxification processes in immatures compared to adults, and (iii) importantly the potential detrimental effects of Hg in early life. Despite very high Hg concentrations in their feathers, neither effects on adults' breeding probability, hatching failure and fledgling failure, nor on adults' survival rate were detected, suggesting that long-term bioaccumulated Hg was not under a chemical form leading to deleterious effects on reproductive parameters in adult individuals. - Highlights: • Immature

  15. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    ... of various GA operations. While some recent high-profile breaches of GA security point to persisting vulnerabilities and limited intelligence information suggests a continued terrorist interest in using GA aircraft...

  16. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  17. Consequences of high-x proton size fluctuations in small collision systems at √{sNN}=200 GeV

    Science.gov (United States)

    McGlinchey, D.; Nagle, J. L.; Perepelitsa, D. V.

    2016-08-01

    Recent measurements of jet production rates at large transverse momentum (pT) in the collisions of small projectiles with large nuclei at the BNL Relativistic Heavy Ion Collider (RHIC) and the CERN Large Hadron Collider indicate that they have an unexpected relationship with estimates of the collision centrality. One compelling interpretation of the data is that they capture an xp-dependent decrease in the average interaction strength of the nucleon in the projectile undergoing a hard scattering. A weakly interacting or "shrinking" nucleon in the projectile strikes fewer nucleons in the nucleus, resulting in a particular pattern of centrality-dependent modifications to high-pT processes. We describe a simple one-parameter geometric implementation of this picture within a modified Monte Carlo Glauber model tuned to d +Au jet data, and explore two of its major consequences. First, the model predicts a particular projectile-species effect on the centrality dependence at high xp, opposite to that expected from a final state energy loss effect. Second, we find that some of the large centrality dependence observed for forward dihadron production in d +Au collisions at RHIC may arise from the physics of the "shrinking" projectile nucleon, in addition to impact parameter dependent shadowing or saturation effects at low nuclear x . We conclude that analogous measurements in recently collected p +Au and 3He+Au collision data at RHIC can provide a unique test of these predictions.

  18. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  19. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  20. Climate Change, Agriculture and Food Security in Tanzania

    DEFF Research Database (Denmark)

    Arndt, Channing; Farmer, William; Strzepek, Kenneth

    2012-01-01

    Due to their reliance on rain-fed agriculture, both as a source of income and consumption, many low-income countries are considered to be the most vulnerable to climate change. Here, we estimate the impact of climate change on food security in Tanzania. Representative climate projections are used...... as the channel of impact, food security in Tanzania appears likely to deteriorate as a consequence of climate change. The analysis points to a high degree of diversity of outcomes (including some favorable outcomes) across climate scenarios, sectors, and regions. Noteworthy differences in impacts across...

  1. Market Design and Supply Security in Imperfect Power Markets

    DEFF Research Database (Denmark)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies oncapacity markets...... increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market...

  2. Security of Radioactive Sources. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this implementation guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists and facility and transport operators, as well as for law enforcement officers.

  3. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. Analysis of the effect of variations in parameter values on the predicted radiological consequences of geologic disposal of high-level waste

    International Nuclear Information System (INIS)

    Hill, M.D.

    1979-06-01

    A preliminary assessment of the radiological consequences of geologic disposal of high-level waste (Hill and Grimwood. NRPB-R69 (1978)) identified several areas where further research is required before this disposal option can be fully evaluated. This report is an analysis of the sensitivity of the results of the preliminary assessment to the assumptions made and the values of the parameters used. The parameters considered include the leach rate of the waste, the ground-water velocity, the length of the flow path from the repository to a source of drinking water and the sorption constants of the principle radionuclides. The results obtained by varying these parameters are used to examine the effects of assumptions such as the time at which leaching of the waste begins. The sensitivity analysis shows the relative importance of the waste canisters, the waste form and the geologic barrier to radionuclide migration in determining potential doses. These results are used to identify research priorities, establish preliminary design criteria and indicate developments needed in the mathematical modelling of the movement of radionuclides from a repository to the biosphere. (author)

  6. MALDI-TOF mass spectrometry and high-consequence bacteria: safety and stability of biothreat bacterial sample testing in clinical diagnostic laboratories.

    Science.gov (United States)

    Tracz, Dobryan M; Tober, Ashley D; Antonation, Kym S; Corbett, Cindi R

    2018-03-01

    We considered the application of MALDI-TOF mass spectrometry for BSL-3 bacterial diagnostics, with a focus on the biosafety of live-culture direct-colony testing and the stability of stored extracts. Biosafety level 2 (BSL-2) bacterial species were used as surrogates for BSL-3 high-consequence pathogens in all live-culture MALDI-TOF experiments. Viable BSL-2 bacteria were isolated from MALDI-TOF mass spectrometry target plates after 'direct-colony' and 'on-plate' extraction testing, suggesting that the matrix chemicals alone cannot be considered sufficient to inactivate bacterial culture and spores in all samples. Sampling of the instrument interior after direct-colony analysis did not recover viable organisms, suggesting that any potential risks to the laboratory technician are associated with preparation of the MALDI-TOF target plate before or after testing. Secondly, a long-term stability study (3 years) of stored MALDI-TOF extracts showed that match scores can decrease below the threshold for reliable species identification (<1.7), which has implications for proficiency test panel item storage and distribution.

  7. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  8. Successful Characterization and Remedial Contour of Highly Contaminated Mercury Soil at the Y-12 National Security Complex - 13593

    Energy Technology Data Exchange (ETDEWEB)

    White, Aaron; Rigas, Michael [U.S. Department of Energy Oak Ridge Operations, Oak Ridge, TN 37830 (United States); Birchfield, Joseph W. III [1528 Paxton Drive Knoxville, TN 37918 (United States)

    2013-07-01

    An area known as the 81-10 pad within the footprint of the Y-12 National Security Complex, suspected to be heavily contaminated with mercury, was slated for characterization in support of a Federal Facilities Agreement (FFA) milestone to be accomplished by September 30, 2012. A full remedial design report (RDR) required the soil in Exposure Unit -9 (EU-9) to be fully characterized for a number of contaminates of concern including mercury. The goal of this characterization effort was to determine what soil, if any, would need to be removed for the protection of industrial workers and impacts to the surface and ground water. Funding for this project was made available using buy-back scope under the American Recovery and Reinvestment Act (ARRA). The EU-9 soil unit involved 3 different classifications which were determined as follows: Class 1: Known to have been impacted, contamination is likely; Class 2: Suspected to have been impacted, contamination is unknown; Class 3: Area not known to have been impacted, contamination unlikely. Due to various sampling and analysis events since the 1980's, significant mercury contamination was expected under the concrete pad of an area known as 81-10. Mercury contamination outside of the boundary of this pad within the EU-9 footprint was not known and therefore an original planned estimate of 1,461 cubic meters of material were expected to be heavily contaminated with mercury requiring removal, treatment and disposal. Through the use of a highly effective nature and extent sampling and analysis design that involved a hybrid of statistically-based and judgmental sampling, the actual remedial contour requiring removal was approximately 717 cubic meters, roughly 12% of the original estimate. This characterization approach was executed in full compliance with the Record of Decision (ROD) [1] documents that were agreed upon by the U.S. Department of Energy, Environmental Protection Agency and Tennessee Department of Environment and

  9. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  10. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  11. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  12. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  15. Childhood Obesity Causes & Consequences

    Science.gov (United States)

    ... and Local Programs Related Topics Diabetes Nutrition Childhood Obesity Causes & Consequences Recommend on Facebook Tweet Share Compartir ... determine how a community is designed. Consequences of Obesity More Immediate Health Risks Obesity during childhood can ...

  16. Reminder: Mandatory Computer Security Course

    CERN Multimedia

    IT Department

    2011-01-01

    Just like any other organization, CERN is permanently under attack – even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Therefore, a new dedicated basic computer security course has been designed informing you about the “Do’s” and “Dont’s” when using CERN's computing facilities. This course is mandatory for all person owning a CERN computer account and must be followed once every three years. Users who have never done the course, or whose course needs to be renewe...

  17. New Mandatory Computer Security Course

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    Just like any other organization, CERN is permanently under attack - even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Since 2007, newcomers have to follow a dedicated basic computer security course informing them about the “Do’s” and “Dont’s” when using CERNs computing facilities. This course has recently been redesigned. It is now mandatory for all CERN members (users and staff) owning a CERN computer account and must be followed once every three years. Members who...

  18. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  19. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  20. Consequence-driven cyber-informed engineering (CCE)

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Sarah G. [Idaho National Lab. (INL), Idaho Falls, ID (United States); St Michel, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Robert [Idaho National Lab. (INL), Idaho Falls, ID (United States); Assante, Michael [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-10-18

    The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal of the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.

  1. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  2. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  3. Managing and understanding risk perception of surface leaks from CCS sites: risk assessment for emerging technologies and low-probability, high-consequence events

    Science.gov (United States)

    Augustin, C. M.

    2015-12-01

    Carbon capture and storage (CCS) has been suggested by the Intergovernmental Panel on Climate Change as a partial solution to the greenhouse gas emissions problem. As CCS has become mainstream, researchers have raised multiple risk assessment issues typical of emerging technologies. In our research, we examine issues occuring when stored carbon dioxide (CO2) migrates to the near-surface or surface. We believe that both the public misperception and the physical reality of potential environmental, health, and commercial impacts of leak events from such subsurface sites have prevented widespread adoption of CCS. This paper is presented in three parts; the first is an evaluation of the systemic risk of a CCS site CO2 leak and models indicating potential likelihood of a leakage event. As the likelihood of a CCS site leak is stochastic and nonlinear, we present several Bayesian simulations for leak events based on research done with other low-probability, high-consequence gaseous pollutant releases. Though we found a large, acute leak to be exceptionally rare, we demonstrate potential for a localized, chronic leak at a CCS site. To that end, we present the second piece of this paper. Using a combination of spatio-temporal models and reaction-path models, we demonstrate the interplay between leak migrations, material interactions, and atmospheric dispersion for leaks of various duration and volume. These leak-event scenarios have implications for human, environmental, and economic health; they also have a significant impact on implementation support. Public acceptance of CCS is essential for a national low-carbon future, and this is what we address in the final part of this paper. We demonstrate that CCS remains unknown to the general public in the United States. Despite its unknown state, we provide survey findings -analyzed in Slovic and Weber's 2002 framework - that show a high unknown, high dread risk perception of leaks from a CCS site. Secondary findings are a

  4. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Communicating Low-Probability High-Consequence Risk, Uncertainty and Expert Confidence: Induced Seismicity of Deep Geothermal Energy and Shale Gas.

    Science.gov (United States)

    Knoblauch, Theresa A K; Stauffacher, Michael; Trutnevyte, Evelina

    2018-04-01

    Subsurface energy activities entail the risk of induced seismicity including low-probability high-consequence (LPHC) events. For designing respective risk communication, the scientific literature lacks empirical evidence of how the public reacts to different written risk communication formats about such LPHC events and to related uncertainty or expert confidence. This study presents findings from an online experiment (N = 590) that empirically tested the public's responses to risk communication about induced seismicity and to different technology frames, namely deep geothermal energy (DGE) and shale gas (between-subject design). Three incrementally different formats of written risk communication were tested: (i) qualitative, (ii) qualitative and quantitative, and (iii) qualitative and quantitative with risk comparison. Respondents found the latter two the easiest to understand, the most exact, and liked them the most. Adding uncertainty and expert confidence statements made the risk communication less clear, less easy to understand and increased concern. Above all, the technology for which risks are communicated and its acceptance mattered strongly: respondents in the shale gas condition found the identical risk communication less trustworthy and more concerning than in the DGE conditions. They also liked the risk communication overall less. For practitioners in DGE or shale gas projects, the study shows that the public would appreciate efforts in describing LPHC risks with numbers and optionally risk comparisons. However, there seems to be a trade-off between aiming for transparency by disclosing uncertainty and limited expert confidence, and thereby decreasing clarity and increasing concern in the view of the public. © 2017 Society for Risk Analysis.

  7. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  10. Brain drain: Propulsive factors and consequences

    Directory of Open Access Journals (Sweden)

    Dragan ILIC

    2018-01-01

    Full Text Available When speaking about the total number of highly educated individuals’ migration, it is easy to spot that it is rapidly increasing. The brain drain issues should be taken very seriously especially in under developed and in the developing countries, knowing that the human capital is globally mobile and that highly educated individuals can without any issues market their knowledge around the globe. Dealing with it requires a carefully tailored strategy for these countries, which are suffering from severe human capital losses on annual basis. Since the labor markets of today are highly competitive, it is necessary for these countries to secure good advancement and doing business opportunities. The purpose of this research is to provide an insight into the key propulsive factors and potential consequences caused by the brain drain. The method used in order to conduct the research was a carefully designed questionnaire taken by the date subject enrolled at the third and fourth years of state governed and privately owned universities. This research shows that one of the key reasons for brain drain in underdeveloped and in the developing countries is shortage of further educational advancement opportunities.

  11. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  12. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  13. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. Privatisation of security:

    DEFF Research Database (Denmark)

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  16. Vertical Equity Consequences of Very High Cigarette Tax Increases: If the Poor Are the Ones Smoking, How Could Cigarette Tax Increases Be Progressive?

    Science.gov (United States)

    Colman, Gregory J.; Remler, Dahlia K.

    2008-01-01

    Cigarette smoking is concentrated among low-income groups. Consequently, cigarette taxes are considered regressive. However, if poorer individuals are much more price sensitive than richer individuals, then tax increases would reduce smoking much more among the poor and their cigarette tax expenditures as a share of income would rise by much less…

  17. High environmental ammonia exposure has developmental-stage specific and long-term consequences on the cortisol stress response in zebrafish.

    Science.gov (United States)

    Williams, Tegan A; Bonham, Luke A; Bernier, Nicholas J

    2017-12-01

    The capacity for early life environmental stressors to induce programming effects on the endocrine stress response in fish is largely unknown. In this study we determined the effects of high environmental ammonia (HEA) exposure on the stress response in larval zebrafish, assessed the tolerance of embryonic and larval stages to HEA, and evaluated whether early life HEA exposure has long-term consequences on the cortisol response to a novel stressor. Exposure to 500-2000μM NH 4 Cl for 16h did not affect the gene expression of corticotropin-releasing factor (CRF) system components in 1day post-fertilization (dpf) embryos, but differentially increased crfa, crfb and CRF binding protein (crfbp) expression and stimulated both dose- and time-dependent increases in the whole body cortisol of 5dpf larvae. Pre-acclimation to HEA at 1dpf did not affect the cortisol response to a subsequent NH 4 Cl exposure at 5dpf. In contrast, pre-acclimation to HEA at 5dpf caused a small but significant reduction in the cortisol response to a second NH 4 Cl exposure at 10dpf. While continuous exposure to 500-2000μM NH 4 Cl between 0 and 5dpf had a modest effect on mean survival time, exposure to 400-1000μM NH 4 Cl between 10 and 14dpf decreased mean survival time in a dose-dependent manner. Moreover, pre-acclimation to HEA at 5dpf significantly decreased the risk of mortality to continuous NH 4 Cl exposure between 10 and 14dpf. Finally, while HEA at 1dpf did not affect the cortisol stress response to a novel vortex stressor at 5dpf, the same HEA treatment at 5dpf abolished vortex stressor-induced increases in whole body cortisol at 10 and 60dpf. Together these results show that the impact of HEA on the cortisol stress response during development is life-stage specific and closely linked to ammonia tolerance. Further, we demonstrate that HEA exposure at the larval stage can have persistent effects on the capacity to respond to stressors in later life. Copyright © 2017 Elsevier Inc. All

  18. High temperature oxidation of metals: vacancy injection and consequences on the mechanical properties; Consequences de l'oxydation haute temperature sur l'injection de defauts et le comportement mecanique des materiaux metalliques

    Energy Technology Data Exchange (ETDEWEB)

    Perusin, S

    2004-11-15

    The aim of this work is to account for the effects of the high temperature oxidation of metals on their microstructure and their mechanical properties. 'Model' materials like pure nickel, pure iron and the Ni-20Cr alloy are studied. Nickel foils have been oxidised at 1000 C on one side only in laboratory air, the other side being protected from oxidation by a reducing atmosphere. After the oxidation treatment, the unoxidized face was carefully examined by using an Atomic Force Microscope (AFM). Grain boundaries grooves were characterised and their depth were compared to the ones obtained on the same sample heat treated in the reducing atmosphere during the same time. They are found to be much deeper in the case of the single side oxidised samples. It is shown that this additional grooving is directly linked to the growth of the oxide scale on the opposite side and that it can be explained by the diffusion of the vacancies produced at the oxide scale - metal interface, across the entire sample through grain boundaries. Moreover, the comparison between single side oxidised samples and samples oxidised on both sides points out that voids in grain boundaries are only observed in this latter case proving the vacancies condensation in the metal when the two faces are oxidised. The role of the carbon content and the sample's geometry on this phenomenon is examined in detail. The diffusion of vacancies is coupled with the transport of oxygen so that a mechanism of oxygen transport by vacancies is suggested. The tensile tests realised at room temperature on nickel foils (bamboo microstructure) show that the oxide scale can constitute a barrier to the emergence of dislocations at the metal surface. Finally, the Ni-20Cr alloy is tested in tensile and creep tests between 25 and 825 C in oxidising or reducing atmospheres. (author)

  19. NNSA/NV Consequence Management Capabilities for Radiological Emergency Response

    International Nuclear Information System (INIS)

    Bowman, D. R.

    2002-01-01

    The U.S. Department of Energy's National Nuclear Security Administration Nevada Operations Office (NNSA/NV) provides an integrated Consequence Management (CM) response capability for the (NNSA) in the event of a radiological emergency. This encompasses planning, technical operations, and home team support. As the lead organization for CM planning and operations, NNSA/NV coordinates the response of the following assets during the planning and operational phases of a radiological accident or incident: (1) Predictive dispersion modeling through the Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) and the High Consequence Assessment Group at Sandia National Laboratories (SNL); (2) Regional radiological emergency assistance through the eight Radiological Assistance Program (RAP) regional response centers; (3) Medical advice and assistance through the Radiation Emergency Assistance Center/Training Site (REAC/TS) in Oak Ridge, Tennessee; (4) Aerial radiological mapping using the fixed-wing and rotor-wing aircraft of the Aerial Measuring System (AMS); (5) Consequence Management Planning Teams (CMPT) and Consequence Management Response Teams (CMRT) to provide CM field operations and command and control. Descriptions of the technical capabilities employed during planning and operations are given below for each of the elements comprising the integrated CM capability

  20. 5 CFR 5801.102 - Prohibited securities.

    Science.gov (United States)

    2010-01-01

    ... securities list as a result of marriage, inheritance, gift or otherwise without specific intent to acquire..., which is available in the NRC Public Document Room. (6) Tax treatment of gain on divested securities... employee) may be eligible to defer the tax consequences of divestiture under subpart J of 5 CFR part 2634...

  1. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  2. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  3. Spent fuel reprocessing system security engineering capability maturity model

    International Nuclear Information System (INIS)

    Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong

    2011-01-01

    In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)

  4. SUBSEQUENTLY AQCUIRED ASSETS AS FIDUCIARY SECURITY ON BANK LOANS

    Directory of Open Access Journals (Sweden)

    Trisadini Prasastinah Usanti

    2016-05-01

    Full Text Available Collateral in terms of subsequently acquired assets namely subsequently acquired credit might be charged with fiduciary security. This collateral is not considered ideal regarding the high risk a bank must take. To minimize the risks, the bank analyzes the credit thoroughly, impose fiduciary security officials perfectly and performs monitoring of credits regularly to avoid misconduct committed by the debtor. If a default occurs, the bank will take over the assets. Nevertheless, the problems of execution on the subsequently acquired credits might arise due to debtor’s default and bad debts to the third party. Consequently, subsequently acquired assets as collateral provides as additional collateral. Keywords: bank, subsequently acquired objects, fiduciary, security, loans.

  5. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  6. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  7. 29 CFR 2570.114 - Consequences of default.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.114 Section 2570.114 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(6) § 2570.114 Consequences of default. For 502(c)(6) civil penalty proceedings...

  8. 29 CFR 2570.94 - Consequences of default.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.94 Section 2570.94 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(5) § 2570.94 Consequences of default. For 502(c)(5) civil penalty proceedings, this...

  9. 29 CFR 2570.64 - Consequences of default.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.64 Section 2570.64 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(2) § 2570.64 Consequences of default. For 502(c)(2) civil penalty proceedings, this...

  10. 29 CFR 2570.134 - Consequences of default.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.134 Section 2570.134 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(7) § 2570.134 Consequences of default. For 502(c)(7) civil penalty proceedings...

  11. 29 CFR 2570.164 - Consequences of default.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.164 Section 2570.164 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(8) § 2570.164 Consequences of default. For 502(c)(8) civil penalty proceedings...

  12. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  13. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  14. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  15. Personality traits as predictors of inpatient aggression in a high-security forensic psychiatric setting: prospective evaluation of the PCL-R and IPDE dimension ratings.

    Science.gov (United States)

    Langton, Calvin M; Hogue, Todd E; Daffern, Michael; Mannion, Aisling; Howells, Kevin

    2011-05-01

    The Dangerous and Severe Personality Disorder (DSPD) initiative in England and Wales provides specialized care to high-risk offenders with mental disorders. This study investigated the predictive utility of personality traits, assessed using the Psychopathy Checklist-Revised (PCL-R) and the International Personality Disorder Examination, with 44 consecutive admissions to the DSPD unit at a high-security forensic psychiatric hospital. Incidents of interpersonal physical aggression (IPA) were observed for 39% of the sample over an average 1.5-year period following admission. Histrionic personality disorder (PD) predicted IPA, and Histrionic, Borderline, and Antisocial PDs all predicted repetitive (2+ incidents of) IPA. PCL-R Factor 1 and Facets 1 and 2 were also significant predictors of IPA. PCL-R Factor 1 and Histrionic PD scores were significantly associated with imminence of IPA. Results were discussed in terms of the utility of personality traits in risk assessment and treatment of specially selected high-risk forensic psychiatric patients in secure settings.

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. DSA for Secured Optical Communication

    International Nuclear Information System (INIS)

    Shojaei, A.A.; Amiri, I.S.

    2011-01-01

    Novel system of dark soliton array (DSA) for secured communication is proposed. The DSA are obtained by using a series micro ring resonators where the input wavelengths of λ 1 = 1516 nm, λ 2 = 1518 nm and λ 3 =1520 nm propagate inside the system and finally will be multiplexed. For security applications, the DSA can be tuned and amplified. The use of DSA for high capacity can be realized by using proposed secured system. (author)

  18. Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    Science.gov (United States)

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  19. Evaluation of the security of a hydrogen producing plant by means of the S I cycle coupled to a nuclear reactor of high temperature

    International Nuclear Information System (INIS)

    Ruiz S, T.; Francois, J. L.; Nelson, P. F.; Cruz G, M. J.

    2011-11-01

    At the present one of the processes that demonstrates, theoretically, to be one of the most efficient for the hydrogen production is the thermal-chemistry cycle Sulfur-Iodine. One way of obtaining the temperature ranges required by the process is through the helium coming from a very high temperature reactor. The coupling of the chemical plant with the nuclear plant presents aspects of security that should be analyzed; among them the analysis of the danger of the process materials is, with the purpose of implementing security measures to protect the facilities and equipment s, the environment and the population. These measures can be: emergency answer plans of the stations, definition of the minimum distance required among facilities, determination of the exclusion area, etc. In this study simulations were made with the computer code Phast in order to knowing the possible affectation areas due to the liberation of a great quantity of energy due to a helium leak to very high temperature, of toxic materials or by a possible hydrogen combustion. The results for the liberations of sulfuric acid, hydrogen, iodine, helium and sulfur dioxide are shown, specially. The operation conditions were taken of a combination of the preliminary design proposed by General Atomics and the optimized conditions by the Korea Advanced Institute of Science and Technology, considering a production of 1 kg-mol/s of hydrogen. The iodine was the material that presented a major affectation area. (Author)

  20. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  1. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  2. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  3. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  7. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. A maternal high-fat, high-sucrose diet has sex-specific effects on fetal glucocorticoids with little consequence for offspring metabolism and voluntary locomotor activity in mice.

    Directory of Open Access Journals (Sweden)

    Eunice H Chin

    Full Text Available Maternal overnutrition and obesity during pregnancy can have long-term effects on offspring physiology and behaviour. These developmental programming effects may be mediated by fetal exposure to glucocorticoids, which is regulated in part by placental 11β-hydroxysteroid dehydrogenase (11β-HSD type 1 and 2. We tested whether a maternal high-fat, high-sucrose diet would alter expression of placental 11β-HSD1 and 2, thereby increasing fetal exposure to maternal glucocorticoids, with downstream effects on offspring physiology and behaviour. C57BL/6J mice were fed a high-fat, high-sucrose (HFHS diet or a nutrient-matched low-fat, no-sucrose control diet prior to and during pregnancy and lactation. At day 17 of gestation, HFHS dams had ~20% lower circulating corticosterone levels than controls. Furthermore, there was a significant interaction between maternal diet and fetal sex for circulating corticosterone levels in the fetuses, whereby HFHS males tended to have higher corticosterone than control males, with no effect in female fetuses. However, placental 11β-HSD1 or 11β-HSD2 expression did not differ between diets or show an interaction between diet and sex. To assess potential long-term consequences of this sex-specific effect on fetal corticosterone, we studied locomotor activity and metabolic traits in adult offspring. Despite a sex-specific effect of maternal diet on fetal glucocorticoids, there was little evidence of sex-specific effects on offspring physiology or behaviour, although HFHS offspring of both sexes had higher circulating corticosterone at 9 weeks of age. Our results suggest the existence of as yet unknown mechanisms that mitigate the effects of altered glucocorticoid exposure early in development, making offspring resilient to the potentially negative effects of a HFHS maternal diet.

  10. Genesis of enterprise financial security

    Directory of Open Access Journals (Sweden)

    Davydenko N. M.

    2015-05-01

    Full Text Available The article analyzes the scientific approaches to the definition of «financial security of entities», advantages and disadvantages of these approaches are highlighted. The own definition of financial security of entities is given. The composition of elements of enterprise financial security and principles of its provision are defined. Тhe role of individual elements of financial security to ensure high efficiency operation and development of enterprises is significant and has a direct impact on their solvency, liquidity and profitability.

  11. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  12. [Biological security confronting bioterrorism].

    Science.gov (United States)

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  13. Today's School Security

    Science.gov (United States)

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  14. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  15. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  16. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  17. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  18. Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)

    NARCIS (Netherlands)

    Massacci, F.; Zannone, N.; Giorgini, P.; Maiden, N.; Mylopoulos, J.; Yu, E.

    2011-01-01

    The last years have seen a growing concern on the security of information systems and, consequently, a call to arms for including security aspects during the entire development process. Unfortunately, most proposals treat security in system-oriented terms and model information systems through the

  19. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  20. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  1. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  2. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  3. Recognizing IT risks - acting with foresight or: ''practical reasons for comprehensive IT security''; IT-Risiken erkennen, vorausschauend handeln oder: ''Praktische Gruende fuer umfassende IT-Security''

    Energy Technology Data Exchange (ETDEWEB)

    Schaeffer, P.A.R. [TUeV Rheinland Secure iT GmbH, Koeln (Germany)

    2006-07-01

    Comprehensive IT security expects all threats and every possible consequence to be identified in order to deduce and develop appropriate counter measures. This article describes two exemplary threats to an IT infrastructure: 'Hacking Internal Networks' and 'A High Promising Target: Web Applications'. (orig.)

  4. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  5. Pharmacovigilance: the devastating consequences of not thinking ...

    African Journals Online (AJOL)

    Pharmacovigilance: the devastating consequences of not thinking about adverse drug reactions: The burden of adverse drug reactions (ADRs) on patient care has been found to be high globally and is particularly high in South Africa.

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  9. Perceptions of randomized security schedules.

    Science.gov (United States)

    Scurich, Nicholas; John, Richard S

    2014-04-01

    Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.

  10. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  11. The Supply of Medical Radioisotopes. Final Report of the Third Mandate of the High-level Group on the Security of Supply of Medical Radioisotopes (2013-2015)

    International Nuclear Information System (INIS)

    Charlton, Kevin; )

    2016-07-01

    At the request of its member countries, the Organisation for Economic Co-operation and Development (OECD) Nuclear Energy Agency (NEA) became involved in global efforts to ensure a secure supply of molybdenum-99 ( 99 Mo)/technetium-99m ( 99m Tc). In April 2009, the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR) was created and received an initial, two-year mandate from the NEA Steering Committee for Nuclear Energy to examine the causes of supply shortages of 99 Mo/ 99m Tc and develop a policy approach to address them. In its first mandate, the HLG-MR conducted a comprehensive economic study of the 99 Mo/ 99m Tc supply chain, which identified the key areas of vulnerability and major issues to be addressed. The HLG-MR released a policy approach, including six principles (Appendix 1) and supporting recommendations to help resolve the issues in the 99 Mo/ 99m Tc market. In the second mandate (2011-2013), the HLG-MR worked to encourage the implementation of the six policy principles and promoted an industry transition away from the use of highly enriched uranium (HEU) targets for 99 Mo production. Projects were undertaken by the NEA that resulted in the publication of documents and reports to assist in implementing the HLG-MR policy approach. The second mandate showed that, while commendable progress had occurred in many areas, there were still major issues in the 99 Mo/ 99m Tc market, with some continued government subsidisation, insufficient ORC and inadequate reimbursement for 99 mTc. Potential future periods of supply shortage were identified, particularly concerning the likely loss of significant capacity around 2016. In the third mandate, the HLG-MR continued its efforts to help ensure the global security of supply of 99 Mo/ 99m Tc through implementation of the six policy principles. The NEA undertook a further self-assessment review of the 99 Mo/ 99m Tc supply chain, focusing again on progress with implementing FCR and paid ORC and

  12. Adolescent childbearing: consequences and interventions.

    Science.gov (United States)

    Ruedinger, Emily; Cox, Joanne E

    2012-08-01

    Adolescent childbearing in the United States continues to occur at high rates compared with other industrialized nations, despite a recent decline. Adolescent mothers and their offspring are at risk for negative outcomes. Recent literature exploring the consequences of teenage childbearing and interventions to ameliorate these consequences are presented. Negative consequences of adolescent childbearing can impact mothers and their offspring throughout the lifespan. These consequences are likely attributable to social and environmental factors rather than solely to maternal age. Increasing educational attainment, preventing repeat pregnancy and improving mother-child interactions can improve outcomes for mothers and their children. Home, community, school and clinic-based programs are all viable models of service delivery to this population. Connecting teen mothers with comprehensive services to meet their social, economic, health and educational needs can potentially improve long-term outcomes for both mothers and their offspring. Programs that deliver care to this population in culturally sensitive, developmentally appropriate ways have demonstrated success. Future investigation of parenting interventions with larger sample sizes and that assess multiple outcomes will allow comparison among programs. Explorations of the role of the father and coparenting are also directions for future research.

  13. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  14. Problems in use and security of measurement of high temperature strain gages at various temperature limits up to 10000C

    International Nuclear Information System (INIS)

    Ziegler, K.

    1982-01-01

    The examples given show the quality and use of manufacturers' data for a series of behaviour criteria for strain gages in the high temperature region. These results should not only be regarded critically. The manufacturer must appreciate that the very costly programme of investigations on the users' side represents a product development for large parts for the manufacturer of the strain gauges. It would therefore be desirable if these considerations were to initiate investigations on the manufacturer's part, in order to clear up the problematic are of the use of strain gages in the high temperature field, in order to provide the customer with more reliable and better strain gage characteristics for very expensive high temperature strain measurements. (orig.) [de

  15. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  16. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  17. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  18. Leadership in organizations with high security and reliability requirements; Liderazgo en organizaciones con altos requisitos de seguridad y fiabilidad

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez, F.

    2013-07-01

    Developing leadership skills in organizations is the key to ensure the sustain ability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  19. CERN Computing Colloquia Spring Series: IT Security - A High-Performance Pattern Matching Engine for Intrusion Detection

    CERN Multimedia

    CERN. Geneva

    2006-01-01

    The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...

  20. Potential roles of research in enhancing the performance of management in securing high quality visitor experiences in wilderness

    Science.gov (United States)

    Stephen F. McCool

    2012-01-01

    Does research help managers provide opportunities for visitors to have high quality experiences in wilderness? Difficulties in applying visitor experience research result from several factors: the nature of wilderness itself, the character of the wilderness visitor experience challenge as a research and management topic, and the paradigm of research applications...

  1. Acromegaly : irreversible clinical consequences

    NARCIS (Netherlands)

    Wassenaar, Monica Johanna Elisabeth

    2010-01-01

    This thesis describes the long-term consequences of growth hormone and insulin-like growth factor I excess in patients cured from acromegaly for a mean duration of 17 years. Regarding the considerable prevalence of diverse morbidity in these patients, during the active phase of the disease but even

  2. Is multiset consequence trivial?

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Paoli, F.

    First Online: 08 September 2016 (2018) ISSN 0039-7857 R&D Projects: GA ČR GA13-14654S EU Projects: European Commission(XE) 689176 - SYSMICS Institutional support: RVO:67985807 Keywords : contraction-free logics * multiset consequence * substructural logics * multiple conclusions Subject RIV: BA - General Mathematics Impact factor: 0.855, year: 2016

  3. Choices and Consequences.

    Science.gov (United States)

    Thorp, Carmany

    1995-01-01

    Describes student use of Hyperstudio computer software to create history adventure games. History came alive while students learned efficient writing skills; learned to understand and manipulate cause, effect choice and consequence; and learned to incorporate succinct locational, climatic, and historical detail. (ET)

  4. Hepatic steatosis : metabolic consequences

    NARCIS (Netherlands)

    Boer, Adriana Maria den

    2006-01-01

    In this thesis we focused on the causes and consequences of hepatic steatosis. Epidemiological studies in humans, as well as experimental studies in animal models, have shown an association between visceral obesity and dyslipidemia, insulin resistance and type 2 diabetes mellitus. The mechanism

  5. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  6. A Study on the Dependable and Secure Relaying Scheme under High Resistance Earth Faults on HV, EHV Line

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.D.; Han, K.N. [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1997-12-31

    This report contains following items for the purpose of investigating and analyzing characteristics of high impedance ground faults. - Reason and characteristics identification of HIF - Modeling of power system - Testing of protective relays using RTD(Real Time Digital Simulator) - Staged ground faults test - Development of new algorithm to detect HIF - Protective coordination schemes between different types of relays - HIF monitoring and relaying scheme and H/W prototyping. (author). 22 refs., 28 figs., 21 tabs.

  7. The High Costs of Low-Grade Inflammation: Persistent Fatigue as a Consequence of Reduced Cellular-Energy Availability and Non-adaptive Energy Expenditure.

    Science.gov (United States)

    Lacourt, Tamara E; Vichaya, Elisabeth G; Chiu, Gabriel S; Dantzer, Robert; Heijnen, Cobi J

    2018-01-01

    Chronic or persistent fatigue is a common, debilitating symptom of several diseases. Persistent fatigue has been associated with low-grade inflammation in several models of fatigue, including cancer-related fatigue and chronic fatigue syndrome. However, it is unclear how low-grade inflammation leads to the experience of fatigue. We here propose a model of an imbalance in energy availability and energy expenditure as a consequence of low-grade inflammation. In this narrative review, we discuss how chronic low-grade inflammation can lead to reduced cellular-energy availability. Low-grade inflammation induces a metabolic switch from energy-efficient oxidative phosphorylation to fast-acting, but less efficient, aerobic glycolytic energy production; increases reactive oxygen species; and reduces insulin sensitivity. These effects result in reduced glucose availability and, thereby, reduced cellular energy. In addition, emerging evidence suggests that chronic low-grade inflammation is associated with increased willingness to exert effort under specific circumstances. Circadian-rhythm changes and sleep disturbances might mediate the effects of inflammation on cellular-energy availability and non-adaptive energy expenditure. In the second part of the review, we present evidence for these metabolic pathways in models of persistent fatigue, focusing on chronic fatigue syndrome and cancer-related fatigue. Most evidence for reduced cellular-energy availability in relation to fatigue comes from studies on chronic fatigue syndrome. While the mechanistic evidence from the cancer-related fatigue literature is still limited, the sparse results point to reduced cellular-energy availability as well. There is also mounting evidence that behavioral-energy expenditure exceeds the reduced cellular-energy availability in patients with persistent fatigue. This suggests that an inability to adjust energy expenditure to available resources might be one mechanism underlying persistent fatigue.

  8. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  9. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  10. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  11. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  12. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  13. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  14. Does Vocational Education Help the "Forgotten Half'?: Short-term Economic Consequences of High School Vocational Education for Non-College Students

    National Research Council Canada - National Science Library

    Rasinski, Kenneth

    1998-01-01

    .... Given the changing nature of employer's demands, one important question is whether those young men and women who take vocational education courses in high school and go to work rather than to college...

  15. Magnitude and consequences of undertreatment of high-risk patients with non-ST segment elevation acute coronary syndromes: insights from the DESCARTES Registry.

    Science.gov (United States)

    Heras, M; Bueno, H; Bardají, A; Fernández-Ortiz, A; Martí, H; Marrugat, J

    2006-11-01

    To analyse intensity of treatment of high-risk patients with non-ST elevation acute coronary syndromes (NSTEACS) included in the DESCARTES (Descripción del Estado de los Sindromes Coronarios Agudos en un Registro Temporal Español) registry. Patients with NSTEACS (n = 1877) admitted to 45 randomly selected Spanish hospitals in April and May 2002 were studied. Patients with ST segment depression and troponin rise were considered high risk (n = 478) and were compared with non-high risk patients (n = 1399). 46.9% of high-risk patients versus 39.5% of non-high-risk patients underwent angiography (p = 0.005), 23.2% versus 18.8% (p = 0.038) underwent percutaneous revascularisation, and 24.9% versus 7.4% (p or = 4, 2-3 and or = 4 (OR 2.87, 95% CI 1.27 to 6.52, p = 0.012). Class I recommended treatments were underused in high-risk patients in the DESCARTES registry. This undertreatment was an independent predictor of death of patients with an acute coronary syndrome.

  16. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  17. Clozapine: an effective treatment for seriously violent and psychopathic men with antisocial personality disorder in a UK high-security hospital.

    Science.gov (United States)

    Brown, Darcy; Larkin, Fintan; Sengupta, Samrat; Romero-Ureclay, Jose L; Ross, Callum C; Gupta, Nitin; Vinestock, Morris; Das, Mrigendra

    2014-10-01

    A number of studies have demonstrated the anti-aggressive properties of clozapine in schizophrenia and its positive effect in borderline personality disorder. There is no published literature on the treatment of antisocial personality disorder (ASPD) with clozapine. We present a case series of 7 patients with primary ASPD and high psychopathic traits treated with clozapine, having a significant history of serious violence and currently detained in a UK based high-security hospital. A retrospective review of case notes was carried out to formulate Clinical Global Impression (CGI) scores and record incidents of violence and aggression. Effect on specific symptom domains (cognitive-perceptual, impulsive-behavioural dyscontrol, affective dysregulation) was also noted. Metabolic parameters and serum clozapine levels were also sampled. All 7 patients showed significant improvement on clozapine. It was shown to benefit all symptom domains, especially impulsive behavioral dyscontrol and anger. The number of violent incidents committed by 6 of the 7 patients reduced significantly, and all patients' risk of violence reduced. Clozapine serum levels for 6 of the 7 patients were in the range 150-350 ng/mL. Clozapine is of benefit in reducing the clinical severity of ASPD. It improved all symptom domains, especially impulsive-behavioral dyscontrol and anger, and reduced levels of aggression and violence, especially at lower doses (serum levels <350 ng/m). To our knowledge, this is the first account of clozapine treatment in patients with ASPD and high psychopathy.

  18. Secure network for beamline control

    International Nuclear Information System (INIS)

    Ohata, T.; Fukui, T.; Ishii, M.; Furukawa, Y.; Nakatani, T.; Matsushita, T.; Takeuchi, M.; Tanaka, R.; Ishikawa, T.

    2001-01-01

    In SPring-8, beamline control system is constructed with a highly available distributed network system. The socket based communication protocol is used for the beamline control mainly. Beamline users can control the equipment by sending simple control commands to a server process, which is running on a beamline-managing computer (Ohata et al., SPring-8 beamline control system, ICALEPCS'99, Trieste, Italy, 1999). At the beginning the network was based on the shared topology at all beamlines. Consequently, it has a risk for misapplication of the user's program to access different machines on the network system cross over beamlines. It is serious problem for the SPring-8 beamline control system, because all beamlines controlled with unified software interfaces. We introduced the switching technology and the firewalls to support network access control. Also the virtual networking (VLAN: IEEE 802.1Q) and the gigabit Ethernet technology (IEEE 802.3ab) are introduced. Thus the network security and the reliability are guaranteed at the higher level in SPring-8 beamline

  19. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  20. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  1. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  2. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  3. High-Rise Construction in Densely Dwelled Cities: Requirements for Premises Insolation and Consequences of their Violation in Russian Law and Jurisprudence

    Science.gov (United States)

    Gongalo, Boris; Gudovicheva, Lubov; Gubareva, Anna; Dobrynina, Larisa

    2018-03-01

    The issues of constructing high-rise, primarily residential, buildings have a great social significance. Not every plot of land, acquired in the Russian Federation is suitable for high-rise construction. Therefore, every construction company that plans to erect a multi-apartment building, a high-rise office building, or a skyscraper must take into account not only technical norms but as well sanitary legislation regulations that set obligatory requirements about insolation of apartments. The article includes a short study of several norms in the Russian legislation regarding insolation of dwellings; analises the problems of judicial interpretation of the statutory limitations. In this aspect it researches the debatable questions arising in practice of state arbitration courts dealing with the lawsuits on allocation of land-plots by the local administration. The analysis of the judicial practice is followed by description of the difficulties facing the developers of land-plots, concerning the project and territorial planning documentation.

  4. Probabilistic Criticality Consequence Evaluation

    International Nuclear Information System (INIS)

    P. Gottlieb; J.W. Davis; J.R. Massari

    1996-01-01

    This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development (WPD) department with the objective of providing a comprehensive, conservative estimate of the consequences of the criticality which could possibly occur as the result of commercial spent nuclear fuel emplaced in the underground repository at Yucca Mountain. The consequences of criticality are measured principally in terms of the resulting changes in radionuclide inventory as a function of the power level and duration of the criticality. The purpose of this analysis is to extend the prior estimates of increased radionuclide inventory (Refs. 5.52 and 5.54), for both internal and external criticality. This analysis, and similar estimates and refinements to be completed before the end of fiscal year 1997, will be provided as input to Total System Performance Assessment-Viability Assessment (TSPA-VA) to demonstrate compliance with the repository performance objectives

  5. The Chernobyl accident consequences

    International Nuclear Information System (INIS)

    2001-04-01

    Five teen years later, Tchernobyl remains the symbol of the greater industrial nuclear accident. To take stock on this accident, this paper proposes a chronology of the events and presents the opinion of many international and national organizations. It provides also web sites references concerning the environmental and sanitary consequences of the Tchernobyl accident, the economic actions and propositions for the nuclear safety improvement in the East Europe. (A.L.B.)

  6. Virtual reality - aesthetic consequences

    OpenAIRE

    Benda, Lubor

    2014-01-01

    In the present work we study aesthetic consequences of virtual reality. Exploring the fringe between fictional and virtual is one of the key goals, that will be achieved through etymologic and technologic definition of both fiction and virtual reality, fictional and virtual worlds. Both fiction and virtual reality will be then studied from aesthetic distance and aesthetic pleasure point of view. At the end, we will see the main difference as well as an common grounds between fiction and virtu...

  7. The importance of high-level predators in marine protected area management: Consequences of their decline and their potential recovery in the Mediterranean context

    Directory of Open Access Journals (Sweden)

    Giulia Prato

    2013-11-01

    Full Text Available High-level predators have been depleted in the oceans worldwide following centuries of selective fishing. There is widespread evidence that high-level predators’ extirpation may trigger trophic cascades leading to the degradation of marine ecosystems. Restoration of large carnivores to former levels of abundance might lead to ecosystem recovery, but very few pristine ecosystems are left as baselines for comparison. Marine protected areas (MPAs can trigger initial rapid increases of high-level predator abundance and biomass. Nevertheless, long term protection is needed before the ecosystem's carrying capacity for large carnivores is approached and indirect effects on lower trophic levels are observed. The Mediterranean is probably very far from its pristine condition, due to a long history of fishing. Today small to medium-sized consumers (e.g. sea breams are the most abundant predators shaping coastal benthic communities, while historical reconstructions depict abundant populations of large piscivores and sharks inhabiting coastal areas. Mediterranean MPAs are following a promising trajectory of ecosystem recovery, as suggested by a strong gradient of fish biomass increase. Consistent monitoring methods to assess relative variations of high-level predators, together with food-web models aimed at disentangling the indirect effects of their recovery, could be useful tools to help set up appropriate management strategies of MPAs.

  8. New overhead lines are required for the land - and Europe. The new regulation of the TEN-E regulations and their consequences for the Germann planning law and licensing law for high-voltage power lines under special consideration of the regulations of the public relations; Neue Leitungen braucht das Land - und Europa. Die Neuregelung der TEN-E-Leitlinien und deren Konsequenzen fuer das deutsche Planungs- und Genehmigungsrecht fuer Hoechstspannungsleitungen unter besonderer Beruecksichtigung der Vorschriften ueber die Oeffentlichkeitsbeteiligung

    Energy Technology Data Exchange (ETDEWEB)

    Schadtle, Kai [Stuttgart Univ. (Germany). Abt. fuer Rechtswissenschaft

    2013-05-15

    The German energy policy turnaround requires an optimization of the energy infrastructure. The energy policy objectives of the European Union with respect to competitiveness, security of supply and sustainability require a rapid expansion and transformation of the European energy infrastructure. Under this aspect, the author of the contribution under consideration reports on the revision of the TEN-E guidelines and their consequences for the German planning law and licensing law for high-voltage power lines with special consideration of the rules of the public relations. The national legal framework for the development of the German transmission system and the design of the new TEN-E guidelines for the trans-European network development are presented.

  9. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. A Secure Web Application Providing Public Access to High-Performance Data Intensive Scientific Resources - ScalaBLAST Web Application

    International Nuclear Information System (INIS)

    Curtis, Darren S.; Peterson, Elena S.; Oehmen, Chris S.

    2008-01-01

    This work presents the ScalaBLAST Web Application (SWA), a web based application implemented using the PHP script language, MySQL DBMS, and Apache web server under a GNU/Linux platform. SWA is an application built as part of the Data Intensive Computer for Complex Biological Systems (DICCBS) project at the Pacific Northwest National Laboratory (PNNL). SWA delivers accelerated throughput of bioinformatics analysis via high-performance computing through a convenient, easy-to-use web interface. This approach greatly enhances emerging fields of study in biology such as ontology-based homology, and multiple whole genome comparisons which, in the absence of a tool like SWA, require a heroic effort to overcome the computational bottleneck associated with genome analysis. The current version of SWA includes a user account management system, a web based user interface, and a backend process that generates the files necessary for the Internet scientific community to submit a ScalaBLAST parallel processing job on a dedicated cluster

  12. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  13. Feeding and metabolic consequences of scheduled consumption of large, binge-type meals of high fat diet in the Sprague-Dawley rat.

    Science.gov (United States)

    Bake, T; Morgan, D G A; Mercer, J G

    2014-04-10

    Providing rats and mice with access to palatable high fat diets for a short period each day induces the consumption of substantial binge-like meals. Temporal food intake structure (assessed using the TSE PhenoMaster/LabMaster system) and metabolic outcomes (oral glucose tolerance tests [oGTTs], and dark phase glucose and insulin profiles) were examined in Sprague-Dawley rats given access to 60% high fat diet on one of 3 different feeding regimes: ad libitum access (HF), daily 2 h-scheduled access from 6 to 8 h into the dark phase (2 h-HF), and twice daily 1 h-scheduled access from both 1-2 h and 10-11 h into the dark phase (2×1 h-HF). Control diet remained available during the scheduled access period. HF rats had the highest caloric intake, body weight gain, body fat mass and plasma insulin. Both schedule-fed groups rapidly adapted their feeding behaviour to scheduled access, showing large meal/bingeing behaviour with 44% or 53% of daily calories consumed from high fat diet during the 2 h or 2×1 h scheduled feed(s), respectively. Both schedule-fed groups had an intermediate caloric intake and body fat mass compared to HF and control (CON) groups. Temporal analysis of food intake indicated that schedule-fed rats consumed large binge-type high fat meals without a habitual decrease in preceding intake on control diet, suggesting that a relative hypocaloric state was not responsible or required for driving the binge episode, and substantiating previous indications that binge eating may not be driven by hypothalamic energy balance neuropeptides. In an oGTT, both schedule-fed groups had impaired glucose tolerance with higher glucose and insulin area under the curve, similar to the response in ad libitum HF fed rats, suggesting that palatable feeding schedules represent a potential metabolic threat. Scheduled feeding on high fat diet produces similar metabolic phenotypes to mandatory (no choice) high fat feeding and may be a more realistic platform for mechanistic study

  14. Feeding and metabolic consequences of scheduled consumption of large, binge-type meals of high fat diet in the Sprague–Dawley rat

    Science.gov (United States)

    Bake, T.; Morgan, D.G.A.; Mercer, J.G.

    2014-01-01

    Providing rats and mice with access to palatable high fat diets for a short period each day induces the consumption of substantial binge-like meals. Temporal food intake structure (assessed using the TSE PhenoMaster/LabMaster system) and metabolic outcomes (oral glucose tolerance tests [oGTTs], and dark phase glucose and insulin profiles) were examined in Sprague–Dawley rats given access to 60% high fat diet on one of 3 different feeding regimes: ad libitum access (HF), daily 2 h-scheduled access from 6 to 8 h into the dark phase (2 h-HF), and twice daily 1 h-scheduled access from both 1–2 h and 10–11 h into the dark phase (2 × 1 h-HF). Control diet remained available during the scheduled access period. HF rats had the highest caloric intake, body weight gain, body fat mass and plasma insulin. Both schedule-fed groups rapidly adapted their feeding behaviour to scheduled access, showing large meal/bingeing behaviour with 44% or 53% of daily calories consumed from high fat diet during the 2 h or 2 × 1 h scheduled feed(s), respectively. Both schedule-fed groups had an intermediate caloric intake and body fat mass compared to HF and control (CON) groups. Temporal analysis of food intake indicated that schedule-fed rats consumed large binge-type high fat meals without a habitual decrease in preceding intake on control diet, suggesting that a relative hypocaloric state was not responsible or required for driving the binge episode, and substantiating previous indications that binge eating may not be driven by hypothalamic energy balance neuropeptides. In an oGTT, both schedule-fed groups had impaired glucose tolerance with higher glucose and insulin area under the curve, similar to the response in ad libitum HF fed rats, suggesting that palatable feeding schedules represent a potential metabolic threat. Scheduled feeding on high fat diet produces similar metabolic phenotypes to mandatory (no choice) high fat feeding and may be a more realistic

  15. Tools & training for more secure software

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Just by fate of nature, software today is shipped out as “beta”, coming with vulnerabilities and weaknesses, which should already have been fixed at the programming stage. This presentation will show the consequences of suboptimal software, why good programming, thorough software design, and a proper software development process is imperative for the overall security of the Organization, and how a few simple tools and training are supposed to make CERN software more secure.

  16. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  17. Security Shift in Future Network Architectures

    OpenAIRE

    Hartog, T.; Schotanus, H.A.; Verkoelen, C.A.A.

    2010-01-01

    In current practice military communication infrastructures are deployed as stand-alone networked information systems. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements which current communication architectures cannot deliver. This paper informs IT architects, information architects and security specialists about the separation of network and information security, the consequences of this shift and our view on future communication infrastructures in d...

  18. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  19. Real time high frequency monitoring of water quality in river streams using a UV-visible spectrometer: interest, limits and consequences for monitoring strategies

    Science.gov (United States)

    Faucheux, Mikaël; Fovet, Ophélie; Gruau, Gérard; Jaffrézic, Anne; Petitjean, Patrice; Gascuel-Odoux, Chantal; Ruiz, Laurent

    2013-04-01

    Stream water chemistry is highly variable in space and time, therefore high frequency water quality measurement methods are likely to lead to conceptual advances in the hydrological sciences. Sub-daily data on water quality improve the characterization of pollutant sources and pathways during flood events as well as during long-term periods [1]. However, real time, high frequency monitoring devices needs to be properly calibrated and validated in real streams. This study analyses data from in situ monitoring of a stream water quality. During two hydrological years (2010-11, 2011-12), a submersible UV-visible spectrometer (Scan Spectrolyser) was used for surface water quality measurement at the outlet of a headwater catchment located at Kervidy-Naizin, Western France (AgrHys long-term hydrological observatory, http://www.inra.fr/ore_agrhys/). The spectrometer is reagentless and equipped with an auto-cleaning system. It allows real time, in situ and high frequency (20 min) measurements and uses a multiwavelengt spectral (200-750 nm) for simultaneous measurement of nitrate, dissolved organic carbon (DOC) and total suspended solids (TSS). A global calibration based on a PLS (Partial Least Squares) regression is provided by the manufacturer as default configuration of the UV-visible spectrometer. We carried out a local calibration of the spectrometer based on nitrates and DOC concentrations analysed in the laboratory from daily manual sampling and sub-daily automatic sampling of flood events. TSS results are compared with 15 min turbidity records from a continuous turdidimeter (Ponsel). The results show a good correlation between laboratory data and spectrometer data both during basis flows periods and flood events. However, the local calibration gives better results than the global one. Nutrient fluxes estimates based on high and different low frequency time series (daily to monthly) are compared to discuss the implication for environmental monitoring strategies. Such

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  1. The effects of actinide separation on the radiological consequences of disposal of high-level radioactive waste on the ocean bed

    International Nuclear Information System (INIS)

    Camplin, W.C.; Grimwood, P.D.; White, I.F.

    1980-01-01

    One option in the management of high-level radioactive wastes is to separate the actinides prior to vitrification and disposal. This option is examined in the context of disposal of high-level wastes on the deep ocean bed. The initial quantity of waste corresponds to the generation of 1000 GW(e)y of nuclear energy, and the actinide-separation process is assumed to remove 99% of all elements of atomic number greater than that of actinium. The models used to describe the dispersion of activity from a single disposal site on the bed of the Atlantic Ocean represent both local dispersion and long-term mixing. Collective doses and doses to individuals are calculated for six potential pathways: ingestion of fish, crustacea, molluscs, plankton and seaweed, and external irradiation from contaminated beach sediments. The period from 400 to 1,000,000 years after disposal is considered. The potential radiological impact from disposal of high-level waste without separation of actinides on the ocean bed arises from the actinides; isotopes of americium, neptunium and plutonium give the highest doses. Actinide separation would reduce these doses in proportion to the effectiveness of the separation process, until doses become determined by fission products rather than actinides: the achievable dose reduction would be a factor of approximately a hundred, or less for certain pathways. This reduction applies only to doses to the public from waste disposal: no account was taken of doses arising from the separation process itself or from the management of the separated actinides. The results of the assessment are contrasted with those of similar studies based on toxicity indices. Major deficiencies are identified in the use of toxicity indices as a basis for decision-making. (author)

  2. Psidium guajava Linn. leaf extract affects hepatic glucose transporter-2 to attenuate early onset of insulin resistance consequent to high fructose intake: An experimental study

    Science.gov (United States)

    Mathur, R.; Dutta, Shagun; Velpandian, T.; Mathur, S.R.

    2015-01-01

    Background: Insulin resistance (IR) is amalgam of pathologies like altered glucos metabolism, dyslipidemia, impaired glucose tolerance, non-alcoholic fatty liver disease, and associated with type-II diabetes and cardiometabolic diseases. One of the reasons leading to its increased and early incidence is understood to be a high intake of processed fructose containing foods and beverages by individuals, especially, during critical developmental years. Objective: To investigate the preventive potential of aqueous extract of Psidium guajava leaves (PG) against metabolic pathologies, vis-à-vis, IR, dyslipidemia, hyperleptinemia and hypertension, due to excess fructose intake initiated during developmental years. Materials and Methods: Post-weaning (4 weeks old) male rats were provided fructose (15%) as drinking solution, ad libitum, for 8 weeks and assessed for food and water/fructose intake, body weight, fasting blood sugar, mean arterial pressure, lipid biochemistry, endocrinal (insulin, leptin), histopathological (fatty liver) and immunohistochemical (hepatic glucose transporter [GLUT2]) parameters. Parallel treatment groups were administered PG in doses of 250 and 500 mg/kg/d, po × 8 weeks and assessed for same parameters. Using extensive liquid chromatography-mass spectrometry protocols, PG was analyzed for the presence of phytoconstituents like Myrecetin, Luteolin, Kaempferol and Guavanoic acid and validated to contain Quercetin up to 9.9%w/w. Results: High fructose intake raised circulating levels of insulin and leptin and hepatic GLUT2 expression to promote IR, dyslipidemia, and hypertension that were favorably re-set with PG. Although PG is known for its beneficial role in diabetes mellitus, for the first time we report its potential in the management of lifelong pathologies arising from high fructose intake initiated during developmental years. PMID:25829790

  3. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  4. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  5. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  6. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  7. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  8. Contact-metamorphic illitization and related consequences for the functioning of backfill barriers in high level radioactive waste repositories (South Africa)

    International Nuclear Information System (INIS)

    Buehmann, C.

    2000-01-01

    A clay barrier, consisting of smectite, is common to most disposal designs for HLW repositories. Concerns are that elevated temperatures and long time periods may alter the two properties, the barrier is employed: a high swelling as well as cation exchange capacity (CEC). A ''natural analogue'' approach has therefore been attempted to predict smectite characteristics and stability in relation to time/temperature. The following investigations were performed in order to determine changes in swelling capacity and CEC: (1) Conversion of smectite to other clay minerals. (2) Changes in the layer charge characteristics of the clay minerals. (3) Swelling potential measurements of the smectitic interlayer. Smectite was thermally unstable and transformed into illite via illite/smectite interstratifications (I/S) and chlorite at temperature exceeding about 100 deg. C. The swelling potential was directly related to the proportion of smectite. As a conclusion it can be stated that elevated temperatures (> 70 deg. C) result in the transformation of smectite into illite. For backfill purposes it is recommended that the clay content in the backfill barrier should be as high as technically possible and that mixing the bentonite with K-bearing minerals (granite) should be avoided. (author)

  9. Dispersion of fruit flies (Diptera: Tephritidae) at high and low densities and consequences of mismatching dispersions of wild and sterile flies

    International Nuclear Information System (INIS)

    Meats, A.

    2007-01-01

    Both wild and released (sterile) Bactrocera tryoni (Froggatt) (Diptera: Tephritidae) and wild Bactrocera papayae (Drew and Hancock) in Australia had patchy distributions and comparisons with predictions of the negative binomial model indicated that the degree of clumping was sometimes very high, particularly at low densities during eradication. An increase of mean recapture rate of sterile B. tryoni on either of 2 trap arrays was not accompanied by a reduction in its coefficient of variation and when recapture rates were high, the percentage of traps catching zero decreased only slightly with increase in recapture rate, indicating that it is not practicable to decrease the heterogeneity of dispersion of sterile flies by increasing the number released. There was often a mismatch between the dispersion patterns of the wild and sterile flies, and the implications of this for the efficiency of the sterile insect technique (SIT) were investigated with a simulation study with the observed degrees of mismatch obtained from the monitoring data and assuming the overall ratio of sterile to wild flies to be 100:1. The simulation indicated that mismatches could result in the imposed rate of increase of wild flies being up to 3.5 times higher than that intended (i.e., 0.35 instead of 0.1). The effect of a mismatch always reduces the efficiency of SIT. The reason for this asymmetry is discussed and a comparison made with host-parasitoid and other systems. A release strategy to counter this effect is suggested. (author) [es

  10. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  11. Managing the risks of legacy radioactive sources from a security perspective

    International Nuclear Information System (INIS)

    Alexander, Mark; Murray, Allan

    2008-01-01

    The safety and security risk posed by highly radioactive, long-lived sources at the end of their normal use has not been consistently well-managed in previous decades. The Brazilian Cs-137 accident in 1986 and the Thailand Co-60 accident in 2000 are prime examples of the consequences that ensue from the loss of control of highly dangerous sources after their normal use. With the new international emphasis on security of radioactive sources throughout their life cycle, there is now further incentive to address the management of risks posed by legacy, highly dangerous radioactive sources. The ANSTO South-East Asia Regional Security of Radioactive Sources (RSRS) Project has identified, and is addressing, a number of legacy situations that have arisen as a result of inadequate management practices in the past. Specific examples are provided of these legacy situations and the lessons learned for managing the consequent safety and security risk, and for future complete life-cycle management of highly radioactive sources. (author)

  12. Markets, Climate Change and Food Security in West Africa

    Science.gov (United States)

    Brown, Molly E.; Hintermann, Beat; Higgins, Nathaniel

    2009-01-01

    West Africa is one of the most food insecure regions of the world. Sharply increased food and energy prices in 2008 brought the role of markets in food access and availability around the world into the spotlight, particularly in urban areas. The period of high prices had the immediate consequence of sharply increasing the number of hungry people in the region without boosting farmer incomes significantly. In this article, the interaction between markets, food prices, agricultural technology and development is explored in the context of West Africa. To improve food security in West Africa, sustained commitment to investment in the agriculture sector will be needed to provide some protection against global swings in both production and world markets. Climate change mitigation programs are likely to force global energy and commodity price increases in the coming decades, putting pressure on regions like West Africa to produce more food locally to ensure stability in food security for the most vulnerable.

  13. Market design and supply security in imperfect power markets

    International Nuclear Information System (INIS)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies on capacity markets increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market instead of the energy market. - Highlights: • I model two power generating firms who compete to serve stochastic demand in a multiunit uniform price auction. • In equilibrium, blackout probabilities can arise through capacity withholding. • Capacity mechanisms decrease capacity withholding and the expected energy price. • With dominant firms, capacity mechanisms are only effective if capacity prices are non-competitive and include a mark-up for leaving the energy-only market optimum

  14. VEGF and GLUT1 are highly heritable, inversely correlated and affected by dietary fat intake: Consequences for cognitive function in humans

    Directory of Open Access Journals (Sweden)

    Rita Schüler

    2018-05-01

    Full Text Available Objective: Reduction of brain glucose transporter GLUT1 results in severe neurological dysfunction. VEGF is required to restore and maintain brain glucose uptake across the blood brain barrier via GLUT1, which was shown to be acutely diminished in response to a high fat diet (HFD in mice. The genetic and HFD-related regulation and association of VEGF and GLUT1 (SLC2A1 in humans was investigated in the NUtriGenomic Analysis in Twins (NUGAT study. Methods: 92 healthy and non-obese twins were standardized to a high-carbohydrate low-fat diet for 6 weeks before switched to a 6-week HFD under isocaloric conditions. Three clinical investigation days were conducted: after 6 weeks of low-fat diet and after 1 and 6 weeks of HFD. Serum VEGF and other cytokine levels were measured using ELISA. Gene expression in subcutaneous adipose tissue was assessed by quantitative Real-Time PCR. Genotyping was performed using microarray. The Auditory Verbal Learning Task was conducted to measure cognitive performance. Results: In this human study, we showed that the environmental regulation of SLC2A1 expression and serum VEGF by HFD was inversely correlated and both factors showed strong heritability (>90%. In response to the HFD containing 45% fat, serum VEGF levels increased (P = 0.002 while SLC2A1 mRNA expression in adipose tissue decreased (P = 0.001. Higher BMI was additionally associated with lower SLC2A1 expression. AA-genotypes of the rs9472159 polymorphism, which explained ∼39% of the variation in circulating VEGF concentrations, showed significantly reduced serum VEGF levels (P = 6.4 × 10−11 but higher SLC2A1 expression (P = 0.009 in adipose tissue compared to CC/CA-genotypes after 6 weeks of HFD. Memory performance in AA-genotypes declined in response to the HFD compared to CC- and CA-genotypes. Conclusions: The results provide evidence to suggest the translatability of the dietary regulation of VEGF and GLUT1 from mouse models to humans. Our

  15. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  16. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  17. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  18. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  1. Consequences of the armed conflict in the urban social order. Te case of the high ground of San Cristobal locality. Bogotá 1990-2010.

    Directory of Open Access Journals (Sweden)

    Angie Catherine Callejas Téllez

    2016-11-01

    Full Text Available This article considers the period understood between 1990 and  2010, when the actions of armed groups in the high ground of  San Cristóbal were clearer in order to keep territorial control,  especially over the routes of  communication with other municipalities. Here, elements that make possible the comprehension  of the current context of  the observed territory stand out, for  which a sketch of the history of  the locality was made, and three  key points in which the armed groups had an impact were developed: the configuration of the space, the social relations and the  political participation

  2. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  3. Metapopulations in temporary streams - the role of drought-flood cycles in promoting high genetic diversity in a critically endangered freshwater fish and its consequences for the future.

    Science.gov (United States)

    Sousa-Santos, Carla; Robalo, Joana I; Francisco, Sara M; Carrapato, Carlos; Cardoso, Ana Cristina; Doadrio, Ignacio

    2014-11-01

    Genetic factors have direct and indirect impacts in the viability of endangered species. Assessing their genetic diversity levels and population structure is thus fundamental for conservation and management. In this paper we use mitochondrial and nuclear markers to address phylogeographic and demographic data on the critically endangered Anaecypris hispanica, using a broad sampling set which covered its known distribution area in the Iberian Peninsula. Our results showed that the populations of A. hispanica are strongly differentiated (high and significant ФST and FST values, corroborated by the results from AMOVA and SAMOVA) and genetically diversified. We suggest that the restricted gene flow between populations may have been potentiated by ecological, hydrological and anthropogenic causes. Bayesian skyline plots revealed a signal for expansion for all populations (tMRCA between 68kya and 1.33Mya) and a genetic diversity latitudinal gradient was detected between the populations from the Upper (more diversified) and the Lower (less diversified) Guadiana river basin. We postulate a Pleistocenic westwards colonization route for A. hispanica in the Guadiana river basin, which is in agreement with the tempo and mode of paleoevolution of this drainage. The colonization of River Guadalquivir around 60kya with migrants from the Upper Guadiana, most likely by stream capture, is also suggested. This study highlights the view that critically endangered species facing range retreats (about 47% of its known populations have disappeared in the last 15years) are not necessarily small and genetically depleted. However, the extinction risk is not negligible since A. hispanica faces the combined effect of several deterministic and stochastic negative factors and, moreover, recolonization events after localized extinctions are very unlikely to occur due to the strong isolation of populations and to the patchily ecologically-conditioned distribution of fish. The inferred species

  4. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  5. Selective role of bainitic lath boundary in influencing slip systems and consequent deformation mechanisms and delamination in high-strength low-alloy steel

    Science.gov (United States)

    Liu, S.; Li, X.; Guo, H.; Yang, S.; Wang, X.; Shang, C.; Misra, R. D. K.

    2018-04-01

    We elucidate here the deformation behaviour and delamination phenomenon in a high-strength low-alloy bainitic steel, in terms of microstructure, texture and stress evolution during deformation via in situ electron back-scattered diffraction and electron microscopy. Furthermore, the selective role of bainitic lath boundary on slip systems was studied in terms of dislocation pile-up and grain boundary energy models. During tensile deformation, the texture evolution was concentrated at {1 1 0} and the laths were turn parallel to loading direction. The determining role of lath on the deformation behaviour is governed by length/thickness (l/t) ratio. When l/t > 28, the strain accommodates along the bainite lath rather than along the normal direction. The delamination crack initiated normal to (0 1 1) plane, and become inclined to (0 1 1) plane with continued strain along (0 1 1) plane and lath plane. This indicated that the delamination is not brittle process but plastic process. The lack of dimples at the delaminated surface is because of lack of strain normal to the direction of lath. The delaminated (0 1 1) planes were associated with cleavage along the (1 0 0) plane.

  6. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  7. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  8. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  9. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  10. Augmentation of clozapine with amisulpride: an effective therapeutic strategy for violent treatment-resistant schizophrenia patients in a UK high-security hospital.

    Science.gov (United States)

    Hotham, James E; Simpson, Patrick J D; Brooman-White, Rosalie S; Basu, Amlan; Ross, Callum C; Humphreys, Sharon A; Larkin, Fintan; Gupta, Nitin; Das, Mrigendra

    2014-10-01

    Clozapine is used in the management of treatment-resistant schizophrenia and is effective in reducing aggression; however a subgroup of patients is poorly responsive. For violent patients in this group, there is limited literature on the use of strategies to augment clozapine with other agents. Here we present a case series of 6 schizophrenia patients, within a high-security hospital, who have a history of serious violence and who were treated with clozapine augmented with amisulpride. We reviewed case notes and health records for evidence of violence/aggression and positive factors such as engagement in activities, and Clinical Global Impression (CGI) scores were formulated. We also examined metabolic parameters before and after augmentation. All 6 of the patients showed clinical improvement in symptoms and a reduction in their risk of violence to others. Five patients had a reduction in number of violent/aggressive incidents, and all patients showed improvement in engagement in occupational, vocational, and/or psychological work. Metabolic parameters were largely unchanged except for 1 patient whose Body Mass Index (BMI) increased. Five patients reported side effects as unchanged or improved. These schizophrenia patients with a history of violence showed clinical improvement and reduced aggression and violence with amisulpride augmentation of clozapine. To our knowledge, this is the first report of an antiaggressive benefit of this combination in forensic psychiatric patients. Further studies are warranted to establish the efficacy and anti-aggressive effects of amisulpride augmentation of clozapine.

  11. Nuclear power in Northern Russia: A case study on future energy security in the Murmansk region

    International Nuclear Information System (INIS)

    Kinnunen, Miia; Korppoo, Anna

    2007-01-01

    The economy of the Murmansk region in Russia is based on energy intensive industry, mainly metallurgies, and consequently, the region is highly dependant on the ageing Kola nuclear power plant. This interdependence together with other weaknesses in the regional energy system creates threats to the energy supply security of the region. This paper analyses the internal and external threats influencing the region and presents potential solutions. Scenarios further illustrate possible future paths these potential solutions could deliver by the year 2025

  12. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  13. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  14. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  15. Economic Consequences Of Climate Change

    Science.gov (United States)

    Szlávik, János; Füle, Miklós

    2009-07-01

    Even though the climate conflict resulting from green houses gases (GHG) emissions was evident by the Nineties and the well-known agreements made, their enforcement is more difficult than that of other environmental agreements. That is because measures to reduce GHG emissions interfere with the heart of the economy and the market: energy (in a broader sense than the energy sector as defined by statistics) and economical growth. Analyzing the environmental policy responses to climate change the conclusion is that GHG emission reduction can only be achieved through intensive environmental policy. While extensive environmental protection complements production horizontally, intensive environmental protection integrates into production and the environment vertically. The latter eliminates the source of the pollution, preventing damage. It utilizes the biochemical processes and self-purification of the natural environment as well as technical development which not only aims to produce state-of-the-art goods, but to make production more environmentally friendly, securing a desired environmental state. While in extensive environmental protection the intervention comes from the outside for creating environmental balance, in intensive environmental protection the system recreates this balance itself. Instead of dealing with the consequences and the polluter pays principle, the emphasis is on prevention. It is important to emphasize that climate strategy decisions have complex effects regarding the aspects of sustainability (economical, social, ecological). Therefore, all decisions are political. At present, and in the near future, market economy decisions have little to do with sustainability values under normal circumstances. Taking social and ecological interests into consideration can only be successful through strategic political aims.

  16. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  17. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  18. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  19. Chernobyl: what sanitary consequences?

    International Nuclear Information System (INIS)

    Aurengo, A.

    2001-11-01

    Because of its public health, ecological and industrial consequences, the Chernobyl accident has become a myth which serves as the focus of many fears, justified or not. no one can question the seriousness of the event, but after fifteen years there is still no agreement about the effect it has had or will have on public health. For example, the total number of deaths attributed to Chernobyl varies from less than a hundred to several millions and congenital malformations from negligible to cataclysmic. Effects on public health may be calculated from data on contamination, from the dose received and from the risk, all three of which are likely to be very roughly known; or they may be evaluated on the spot, either by epidemiological studies or by examining medical registers. This report makes an inventory of the different risks and takes stock on them. (N.C.)

  20. The Consequences of Mobility

    DEFF Research Database (Denmark)

    such as the following, related to this general interdisciplinary objective: • Language use in social networks, with special reference to language contact in interpersonal relations and interactions, including codeswitching and other manifestations of the construction of sociocultural identities in face......-to-face interaction • Language contact in society and in the world, and social hierarchies between languages: consequences of (mobility driven) language spread, and the ensuing processes of redefining linguistic differences and identities: language competition, language promotion and language discrimination...... • The complex relationship between language and culture: how can we envisage mobility and language spread across cultural areas without conceptualizing language as culturally neutral? (cp. the frequent conceptualization of English as culturally neutral) • Language contact in the individual: multiple language...