WorldWideScience

Sample records for securing safe water

  1. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  2. Analysis of application of different approaches to secure safe drinking water

    Directory of Open Access Journals (Sweden)

    Pendić Zoran

    2017-01-01

    Full Text Available In this analysis, the risk systems include the systems within which services sensitive to risk are executed. The complex service of population supply with safe drinking water is considered to be risky. Guidelines for drinking water quality of the World Health Organization (WHO recommends the use of effective preventive approaches to risk-based management of the safety and quality of drinking water. For example, Food Safety Law of the Republic of Serbia stipulates mandatory application of HACCP system in order to obtain safe drinking water. Different approaches to preventive risk-based management for the sake of the safety and quality of drinking water are applied nowadays. In this paper we consider the following approaches: Original Codex Alimentarius HACCP system and some of its modified versions; International standard ISO 22000: 2005 Food safety management systems - Requirements for any organization in the food chain; Water Safety Plan (WSP of the World Health Organization (WHO; Generalized HACCP system. All of these approaches are based, to a greater or lesser extent, on the original Codex Alimentarius HACCP system. The paper gives a situation analysis (SWOT analysis of considered approaches.

  3. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  4. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  5. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  6. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  8. Keeping Sealed Radioactive Sources Safe and Secure

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Radioactive sources are used in a wide variety of devices in medical, industrial, agricultural and research facilities worldwide. These sources, such as cobalt-60 and caesium-137, emit high levels of ionizing radiation, which can treat cancer, measure materials used in industry and sterilize food and medical appliances. Problems may arise when these sources are no longer needed, or if they are damaged or decayed. If these sources are not properly stored they can be a threat to human health and the environment and pose a security risk. Procedures to secure these spent or 'disused' sources are often highly expensive and need specialized assistance. The IAEA helps its States find long term solutions for the safe and secure storage of disused sealed radioactive sources (DSRSs)

  9. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  10. Water Security and Climate Change: The Need for Adaptive Governance

    Directory of Open Access Journals (Sweden)

    Tuula Honkonen

    2017-01-01

    Full Text Available Climate change will bring about unprecedented economic, social and environmental effects, which require both the mitigation of greenhouse gas emissions and adaptation to its adverse effects. Water is the main element through which the impacts of climate change will be felt. Climate change results in increased uncertainties, complexities, stress and potential for conflicts within water management, both among and within states. New forms of governance are needed if the world is to respond to the need to adapt to changes in freshwater supply and to manage water security risks. This paper suggests that adaptive governance should to be main-streamed into all water regulation to ensure the availability of and access to safe water resources and to prevent water-related conflicts. The paper discusses the concept of water security in the context of climate change, the threats that climate change poses to water security, and the concept and implications of adaptive governance as a possible solution. The application of adaptive governance requires a certain degree of institutional and normative flexibility, instruments and institutions that can respond and adapt to changes and manage the level of uncertainty associated with the impacts of climate change. The governance institutions, methods and instruments should be responsive to new information and different kinds of uncertainties, while reflecting the vulnerabilities, capacities, needs and priorities of both societies and ecosystems in the face of climate change. Water security risks could be reduced by increased hydrosolidarity among states, which would present the challenges posed by climate change on water governance and security as primarily an opportunity for new forms of cooperation.

  11. Ultra Safe And Secure Blasting System

    Energy Technology Data Exchange (ETDEWEB)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  12. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.

  13. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  14. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  15. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    2008-05-15

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.  Created: 5/15/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 5/19/2008.

  16. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  17. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  18. DOES FOOD SAFETY CONFLICT WITH FOOD SECURITY? THE SAFE CONSUMPTION OF FOOD

    OpenAIRE

    Kinsey, Jean D.

    2004-01-01

    This paper concludes by saying no, food safety and security reinforce each other. It combines food safety and food security into the concept of "safe food consumption." Unsafe food consumption occurs when food contains known substances that lead to short or long term illness or death (botulism) and suspect substances that are believed to lead to delayed diseases (pesticides). It also occurs when hunger or over eating contribute to long-term illness and shorter life expectancy. The costs of il...

  19. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  20. Ground water security and drought in Africa: linking availability, access, and demand.

    Science.gov (United States)

    Calow, Roger C; Macdonald, Alan M; Nicol, Alan L; Robins, Nick S

    2010-01-01

    Drought in Africa has been extensively researched, particularly from meteorological, agricultural, and food security perspectives. However, the impact of drought on water security, particularly ground water dependent rural water supplies, has received much less attention. Policy responses have concentrated on food needs, and it has often been difficult to mobilize resources for water interventions, despite evidence that access to safe water is a serious and interrelated concern. Studies carried out in Ghana, Malawi, South Africa, and Ethiopia highlight how rural livelihoods are affected by seasonal stress and longer-term drought. Declining access to food and water is a common and interrelated problem. Although ground water plays a vital role in buffering the effects of rainfall variability, water shortages and difficulties in accessing water that is available can affect domestic and productive water uses, with knock-on effects on food consumption and production. Total depletion of available ground water resources is rarely the main concern. A more common scenario is a spiral of water insecurity as shallow water sources fail, additional demands are put on remaining sources, and mechanical failures increase. These problems can be planned for within normal development programs. Water security mapping can help identify vulnerable areas, and changes to monitoring systems can ensure early detection of problems. Above all, increasing the coverage of ground water-based rural water supplies, and ensuring that the design and siting of water points is informed by an understanding of hydrogeological conditions and user demand, can significantly increase the resilience of rural communities to climate variability.

  1. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  2. Providing safe drinking water to 1.2 billion unserved people

    Energy Technology Data Exchange (ETDEWEB)

    Gadgil, Ashok J.; Derby, Elisabeth A.

    2003-06-01

    Despite substantial advances in the past 100 years in public health, technology and medicine, 20% of the world population, mostly comprised of the poor population segments in developing countries (DCs), still does not have access to safe drinking water. To reach the United Nations (UN) Millennium Goal of halving the number of people without access to safe water by 2015, the global community will need to provide an additional one billion urban residents and 600 million rural residents with safe water within the next twelve years. This paper examines current water treatment measures and implementation methods for delivery of safe drinking water, and offers suggestions for making progress towards the goal of providing a timely and equitable solution for safe water provision. For water treatment, based on the serious limitations of boiling water and chlorination, we suggest an approach based on filtration coupled with ultraviolet (UV) disinfection, combined with public education. Additionally, owing to the capacity limitations for non-governmental organizations (NGOs) to take on this task primarily on their own, we suggest a strategy based on financially sustainable models that include the private sector as well as NGOs.

  3. Evaluation of the CDC safe water-storage intervention to improve ...

    African Journals Online (AJOL)

    Evaluation of the CDC safe water-storage intervention to improve the microbiological quality of point-of-use drinking water in rural communities in South Africa. ... use of safe household water-storage devices and water treatment processes and improvement of hygiene and sanitation practices in these rural households.

  4. The Connotation and Extension of Agricultural Water Resources Security

    Institute of Scientific and Technical Information of China (English)

    LIU Bu-chun; MEI Xu-rong; LI Yu-zhong; YANG You-lu

    2007-01-01

    The objective of this study is to define agricultural water resources security and its connotation and extension. The definitions of water security, water resources security, and water environment security were summarized, and their relationship was differentiated and analyzed. Based on these, the elements of the conception of agricultural water resources security were hashed and the conception was defined. Agricultural water resources security is the provision of water resource that ensures protection of agriculture against threat, hazards, destruction, and loss. Moreover, the connotation and extension of agricultural water resources security were ascertained. In detail, the connotation of the definition has natural attributes, socioeconomic attributes, and cultural attributes. The extensions of agricultural water resources security include both broad and narrow ones, as well as, food security, agroenvironmental security, agroeconomic security, rural society security, etc. The definition will serve as the frame of reference for developing the researches, limiting the frame of the theory, and founding a appraising system for agricultural water resources security.

  5. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    Science.gov (United States)

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  6. Safe drinking water act: Amendments, regulations and standards

    International Nuclear Information System (INIS)

    Calabrese, E.J.; Gilbert, C.E.; Pastides, H.

    1989-01-01

    This book approaches the topic of safe drinking water by communicating how the EPA has responded to the mandates of Congress. Chapter 1 summarizes what is and will be involved in achieving safe drinking water. Chapter 2 describes the historical development of drinking water regulations. Chapter 3 summarizes the directives of the Safe Drinking Water Act Amendments of 1986. Chapters 4 through 9 discuss each phase of the regulatory program in turn. Specific problems associated with volatile organic chemicals, synthetic organics, inorganic chemicals, and microbiological contaminants are assessed in Chapter 4 and 5. The unique characteristics of radionuclides and their regulation are treated in Chapter 6. The disinfection process and its resultant disinfection by-products are presented in Chapter 7. The contaminant selection process and the additional contaminants to be regulated by 1989 and 1991 and in future years are discussed in Chapters 8 and 9. EPA's Office of Drinking Water's Health Advisory Program is explained in Chapter 10. The record of public water system compliance with the primary drinking water regulations is detailed in Chapter 11. Chapter 12 offers a nongovernmental perspective on the general quality of drinking water and how this is affected by a wide range of drinking water treatment technologies. Separate abstracts are processed for 5 chapters in this book for inclusion in the appropriate data bases

  7. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  8. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  9. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  10. Ideas towards sustainable water security

    Science.gov (United States)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  11. Water availability and management for food security

    Science.gov (United States)

    Food security is directly linked to water security for food production. Water availability for crop production will be dependent upon precipitation or irrigation, soil water holding capacity, and crop water demand. The linkages among these components in rainfed agricultural systems shows the impact ...

  12. Drinking water regulations under the Safe Drinking Water Act. Fact sheet

    International Nuclear Information System (INIS)

    1990-12-01

    The fact sheet describes the requirements covered under the 1986 amendments to the Safe Drinking Water Act. Levels of various contaminants (including radio nuclides) are explained. Also discussed are the Surface Water Treatment Rule and the Total Coliforms Rule

  13. Risk management for assuring safe drinking water.

    Science.gov (United States)

    Hrudey, Steve E; Hrudey, Elizabeth J; Pollard, Simon J T

    2006-12-01

    Millions of people die every year around the world from diarrheal diseases much of which is caused by contaminated drinking water. By contrast, drinking water safety is largely taken for granted by many citizens of affluent nations. The ability to drink water that is delivered into households without fear of becoming ill may be one of the key defining characteristics of developed nations in relation to the majority of the world. Yet there is well-documented evidence that disease outbreaks remain a risk that could be better managed and prevented even in affluent nations. A detailed retrospective analysis of more than 70 case studies of disease outbreaks in 15 affluent nations over the past 30 years provides the basis for much of our discussion [Hrudey, S.E. and Hrudey, E.J. Safe Drinking Water--Lessons from Recent Outbreaks in Affluent Nations. London, UK: IWA Publishing; 2004.]. The insights provided can assist in developing a better understanding within the water industry of the causes of drinking water disease outbreaks, so that more effective preventive measures can be adopted by water systems that are vulnerable. This preventive feature lies at the core of risk management for the provision of safe drinking water.

  14. Security of water treatment facilities

    Energy Technology Data Exchange (ETDEWEB)

    Forsha, C.A. [Univ. of Pittsburgh at Johnstown, Johnstowne, PA (United States)

    2002-06-15

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  15. Security of water treatment facilities

    International Nuclear Information System (INIS)

    Forsha, C.A.

    2002-01-01

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  16. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  17. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  18. Acceptance and Use of Eight Arsenic-Safe Drinking Water Options in Bangladesh

    Science.gov (United States)

    Inauen, Jennifer; Hossain, Mohammad Mojahidul; Johnston, Richard B.; Mosler, Hans-Joachim

    2013-01-01

    Arsenic contamination of drinking water is a serious public health threat. In Bangladesh, eight major safe water options provide an alternative to contaminated shallow tubewells: piped water supply, deep tubewells, pond sand filters, community arsenic-removal, household arsenic removal, dug wells, well-sharing, and rainwater harvesting. However, it is uncertain how well these options are accepted and used by the at-risk population. Based on the RANAS model (risk, attitudes, norms, ability, and self-regulation) this study aimed to identify the acceptance and use of available safe water options. Cross-sectional face-to-face interviews were used to survey 1,268 households in Bangladesh in November 2009 (n = 872), and December 2010 (n = 396). The questionnaire assessed water consumption, acceptance factors from the RANAS model, and socioeconomic factors. Although all respondents had access to at least one arsenic-safe drinking water option, only 62.1% of participants were currently using these alternatives. The most regularly used options were household arsenic removal filters (92.9%) and piped water supply (85.6%). However, the former result may be positively biased due to high refusal rates of household filter owners. The least used option was household rainwater harvesting (36.6%). Those who reported not using an arsenic-safe source differed in terms of numerous acceptance factors from those who reported using arsenic-safe sources: non-users were characterized by greater vulnerability; showed less preference for the taste and temperature of alternative sources; found collecting safe water quite time-consuming; had lower levels of social norms, self-efficacy, and coping planning; and demonstrated lower levels of commitment to collecting safe water. Acceptance was particularly high for piped water supplies and deep tubewells, whereas dug wells and well-sharing were the least accepted sources. Intervention strategies were derived from the results in order to

  19. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  20. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  1. Dual-Level Material and Psychological Assessment of Urban Water Security in a Water-Stressed Coastal City

    Directory of Open Access Journals (Sweden)

    Yajing Huang

    2015-04-01

    Full Text Available The acceleration of urbanization and industrialization has been gradually aggravating water security issues, such as water shortages, water pollution, and flooding or drought disasters and so on. Water security issues have become a great challenge to urban sustainable development. In this context, we proposed a dual-level material and psychological assessment method to assess urban water security. Psychological security coefficients were introduced in this method to combine material security and residents’ security feelings. A typical water-stressed coastal city in China (Dalian was chosen as a case study. The water security status of Dalian from 2010 to 2012 was analysed dynamically. The results indicated that the Dalian water security statuses from 2010 to 2012 were basically secure, but solutions to improve water security status and solve water resource problems are still required. This dual-level material and psychological assessment for urban water security has improved conventional material assessment through the introduction of psychological security coefficients, which can benefit decision-making for urban water planning, management and protection.

  2. The Challenge of Providing Safe Water with an Intermittently Supplied Piped Water Distribution System

    Science.gov (United States)

    Kumpel, E.; Nelson, K. L.

    2012-12-01

    An increasing number of urban residents in low- and middle-income countries have access to piped water; however, this water is often not available continuously. 84% of reporting utilities in low-income countries provide piped water for fewer than 24 hours per day (van den Berg and Danilenko, 2010), while no major city in India has continuous piped water supply. Intermittent water supply leaves pipes vulnerable to contamination and forces households to store water or rely on alternative unsafe sources, posing a health threat to consumers. In these systems, pipes are empty for long periods of time and experience low or negative pressure even when water is being supplied, leaving them susceptible to intrusion from sewage, soil, or groundwater. Households with a non-continuous supply must collect and store water, presenting more opportunities for recontamination. Upgrading to a continuous water supply, while an obvious solution to these challenges, is currently out of reach for many resource-constrained utilities. Despite its widespread prevalence, there are few data on the mechanisms causing contamination in an intermittent supply and the frequency with which it occurs. Understanding the impact of intermittent operation on water quality can lead to strategies to improve access to safe piped water for the millions of people currently served by these systems. We collected over 100 hours of continuous measurements of pressure and physico-chemical water quality indicators and tested over 1,000 grab samples for indicator bacteria over 14 months throughout the distribution system in Hubli-Dharwad, India. This data set is used to explore and explain the mechanisms influencing water quality when piped water is provided for a few hours every 3-5 days. These data indicate that contamination occurs along the distribution system as water travels from the treatment plant to reservoirs and through intermittently supplied pipes to household storage containers, while real

  3. Household's willingness to pay for arsenic safe drinking water in Bangladesh.

    Science.gov (United States)

    Khan, Nasreen Islam; Brouwer, Roy; Yang, Hong

    2014-10-01

    This study examines willingness to pay (WTP) in Bangladesh for arsenic (As) safe drinking water across different As-risk zones, applying a double bound discrete choice value elicitation approach. The study aims to provide a robust estimate of the benefits of As safe drinking water supply, which is compared to the results from a similar study published almost 10 years ago using a single bound estimation procedure. Tests show that the double bound valuation design does not suffer from anchoring or incentive incompatibility effects. Health risk awareness levels are high and households are willing to pay on average about 5 percent of their disposable average annual household income for As safe drinking water. Important factors influencing WTP include the bid amount to construct communal deep tubewell for As safe water supply, the risk zone where respondents live, household income, water consumption, awareness of water source contamination, whether household members are affected by As contamination, and whether they already take mitigation measures. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Water security at local government level in South Africa: a qualitative interview-based analysis

    Directory of Open Access Journals (Sweden)

    Richard Meissner, DPhil

    2018-05-01

    Full Text Available Background: As one of the 40 driest countries in the world with an annual average rainfall of 497 mm, South Africa is a water-scarce country. Additionally, South Africa's rate of economic development is closely linked to its water security. Thus, increasing water stress, supply variability, flooding, and water pollution levels and inadequate access to safe drinking water and sanitation are slowing economic growth. Despite the high premium placed on South Africa's water resources, no commonly shared understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security. Methods: We used interviews and qualitative analyses to establish and compare how people from different lifestyles perceive water security in the Greater Sekhukhune District and the eThekwini Metropolitan Municipalities of South Africa. The inland Sekhukhune has a drier climate and more rural socioeconomic profile than the coastal, urbanised eThekwini with its complex economy and diverse socioeconomic structure. We did face-to-face structured interviews with a diverse stakeholder group consisting of community members, traditional leaders, municipal officials, researchers, business people, and farmers in each municipality and focus groups in two communities of each municipality: Leeuwfontein and Motetema (Sekhukhune and Inanda and Ntshongweni (eThekwini. Each interview lasted 40–60 min, and focus group discussions lasted 90–120 min. We asked the respondents about their understanding of the concept of water security and whether they believe that, at the local and national level, the authorities had achieved water security for all. Findings: Following a qualitative analysis, we found that water security is a state of mind based on context-specific (ie, localised and individualised perceptions held by an individual of water-related threats and how it influences

  5. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  6. Conceptual framework to ensure water security in Ukraine

    Science.gov (United States)

    Gadzalo, Yaroslav; Romashchenko, Mykhailo; Yatsiuk, Mykhailo

    2018-02-01

    As a result of global climate change against the background of natural water supply deterioration and river water content reductions, nowadays Ukraine is facing the problem of environmental degradation of river basins. In light of this, we suggest that achieving an acceptable level of water security in Ukraine should be defined as the strategic objective of national water policy. The state of national water security should be evaluated by its progress in certain sectors. The basic principles of the new water policy of Ukraine are supposed to be represented in Water Strategy of Ukraine. Integrated water management by the basin principle should serve as the main tool for achieving the objectives of water security.

  7. Optimal Allocation of Water Resources Based on Water Supply Security

    Directory of Open Access Journals (Sweden)

    Jianhua Wang

    2016-06-01

    Full Text Available Under the combined impacts of climate change and human activities, a series of water issues, such as water shortages, have arisen all over the world. According to current studies in Science and Nature, water security has become a frontier critical topic. Water supply security (WSS, which is the state of water resources and their capacity and their capacity to meet the demand of water users by water supply systems, is an important part of water security. Currently, WSS is affected by the amount of water resources, water supply projects, water quality and water management. Water shortages have also led to water supply insecurity. WSS is now evaluated based on the balance of the supply and demand under a single water resources condition without considering the dynamics of the varying conditions of water resources each year. This paper developed an optimal allocation model for water resources that can realize the optimal allocation of regional water resources and comprehensively evaluate WSS. The objective of this model is to minimize the duration of water shortages in the long term, as characterized by the Water Supply Security Index (WSSI, which is the assessment value of WSS, a larger WSSI value indicates better results. In addition, the simulation results of the model can determine the change process and dynamic evolution of the WSS. Quanzhou, a city in China with serious water shortage problems, was selected as a case study. The allocation results of the current year and target year of planning demonstrated that the level of regional comprehensive WSS was significantly influenced by the capacity of water supply projects and the conditions of the natural water resources. The varying conditions of the water resources allocation results in the same year demonstrated that the allocation results and WSSI were significantly affected by reductions in precipitation, decreases in the water yield coefficient, and changes in the underlying surface.

  8. Household's willingness to pay for arsenic safe drinking water in Bangladesh

    NARCIS (Netherlands)

    Khan, N.A.; Brouwer, R.; Yang, H.

    2014-01-01

    This study examines willingness to pay (WTP) in Bangladesh for arsenic (As) safe drinking water across different As-risk zones, applying a double bound discrete choice value elicitation approach. The study aims to provide a robust estimate of the benefits of As safe drinking water supply, which is

  9. Exploring Robust and Resilient Pathways to Water Security (Invited)

    Science.gov (United States)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  10. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  11. Effect of Safe Water on Arsenicosis: A Follow-up Study.

    Science.gov (United States)

    Majumdar, Kunal K; Ghose, Aloke; Ghose, Nilima; Biswas, Anirban; Mazumder, D N Guha

    2014-04-01

    Arsenic pollution in groundwater, used for drinking purposes, has been envisaged as a problem of global concern. Treatment options for the management symptoms of chronic arsenicosis are limited. Mitigation option available for dealing with the health problem of ground water arsenic contamination rests mainly on supply of arsenic safe water in arsenic-endemic region of Indo-Bangladesh subcontinent. Limited information is available regarding the long-term effect of chronic arsenic toxicity after stoppage of consumption of arsenic-containing water. The current study was, therefore, done to assess, objectively, the effect of drinking arsenic safe water (water source in their houses were supplied with arsenic removal filters for getting arsenic-free water during the follow-up period. In participants belonging to Cohort-I, the skin score was found to improve significantly at the end of each year, and it was found to be reduced significantly from 2.17 ± 1.09 to 1.23 ± 1.17; P water on skin lesions. The systemic disease symptom score was also found to improve, but less significantly, at the end of 3 years in both the cohorts. Most important observation during the follow-up study was persistence of severe symptoms of chronic lung disease and severe skin lesion including Bowen's disease in spite of taking arsenic-safe water. Further, death could not be prevented to occur because of lung cancer and severe lung disease. It is, therefore, an urgent need to make arrangement for availability of safe water source among the arsenic-affected people in the district. Many of the people in the affected villages are not aware of contamination of their home tube wells with arsenic. Awareness generation and motivation of the people for testing their drinking water sources for arsenic and environmental interventions like rain water harvesting, ground water recharge, and restricting excessive use of ground water for domestic and agricultural purposes are also important to prevent further

  12. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  13. Water, agriculture, energy: a growing interweaving. Towards an extended water security

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2009-01-01

    In this paper, the author first notices that the definition of water security according to the United Nations Development Program (UNDP) is a rather restrictive one. Thus, the search for a global security takes all forms of insufficiencies and (military or not) instabilities into account, and is then related to strategic stakes of State stability such as agriculture production, water or energy. He discusses the determining factors and vulnerabilities of a renewed water security and its implications. He highlights how internal political and social constraints are sources of local and regional tensions. In this respect, agriculture is at the heart of use conflicts (difficult and necessary reform of the sector, rivalries between rural and urban users), and water stress directly affects daily domestic uses. The author then outlines the necessary integration stakes related to water, food and energy by discussing the use of water in energy production, the use of energy to produce drinkable water, the relationship between agriculture and energy, and, of course between agriculture and water as agriculture is the main water consumer

  14. Effect of safe water on arsenicosis: A follow-up study

    Directory of Open Access Journals (Sweden)

    Kunal K Majumdar

    2014-01-01

    Full Text Available Background: Arsenic pollution in groundwater, used for drinking purposes, has been envisaged as a problem of global concern. Treatment options for the management symptoms of chronic arsenicosis are limited. Mitigation option available for dealing with the health problem of ground water arsenic contamination rests mainly on supply of arsenic safe water in arsenic-endemic region of Indo-Bangladesh subcontinent. Limited information is available regarding the long-term effect of chronic arsenic toxicity after stoppage of consumption of arsenic-containing water. Objective: The current study was, therefore, done to assess, objectively, the effect of drinking arsenic safe water (<50 μg/L on disease manifestation of arsenicosis. Results: Manifestations of various skin lesions and systemic diseases associated with chronic arsenic exposure were ascertained initially by carrying on baseline study on 208 participants in Nadia (Cohort-I, with skin lesion and Cohort-II, without skin lesion using a scoring system, as developed by us, and compared objectively at the end of each year for 3 year follow-up period. All the participants who had arsenic contaminated drinking water source in their houses were supplied with arsenic removal filters for getting arsenic-free water during the follow-up period. In participants belonging to Cohort-I, the skin score was found to improve significantly at the end of each year, and it was found to be reduced significantly from 2.17 ± 1.09 to 1.23 ± 1.17; P < 0.001 at the end of 3 year′s intervention study indicating beneficial effect of safe water on skin lesions. The systemic disease symptom score was also found to improve, but less significantly, at the end of 3 years in both the cohorts. Most important observation during the follow-up study was persistence of severe symptoms of chronic lung disease and severe skin lesion including Bowen′s disease in spite of taking arsenic-safe water. Further, death could not be

  15. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  16. Willingness to pay for safe drinking water: Evidence from Parral, Mexico.

    Science.gov (United States)

    Vásquez, William F; Mozumder, Pallab; Hernández-Arce, Jesús; Berrens, Robert P

    2009-08-01

    A referendum-format contingent valuation (CV) survey is used to elicit household willingness to pay responses for safe and reliable drinking water in Parral, Mexico. Households currently adopt a variety of averting and private investment choices (e.g., bottled water consumption, home-based water treatment, and installation of water storage facilities) to adapt to the existing water supply system. These revealed behaviors indicate the latent demand for safer and more reliable water services, which is corroborated by the CV survey evidence. Validity findings include significant scope sensitivity in WTP for water services. Further, results indicate that households are willing to pay from 1.8% to 7.55% of reported household income above their current water bill for safe and reliable drinking water services, depending upon the assumptions about response uncertainty.

  17. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  18. On the Water-Food Nexus: an Optimization Approach for Water and Food Security

    Science.gov (United States)

    Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem

    2016-04-01

    Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.

  19. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  20. Water security in Southern Africa: Discourses securitising water and the implications for water governance and politics

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-01-01

    Full Text Available In the South African water discourse, the water security concept is a complex notion that not only covers the quantitative aspects of water demand and supply but is also linked to national security and political stability, as well as human well...

  1. Conceptualizations of water security in the agricultural sector: Perceptions, practices, and paradigms

    Science.gov (United States)

    Malekian, Atefe; Hayati, Dariush; Aarts, Noelle

    2017-01-01

    Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.

  2. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    Science.gov (United States)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  3. 76 FR 72973 - Notice of Lodging of Consent Decree Under the Clean Water Act and Safe Drinking Water Act

    Science.gov (United States)

    2011-11-28

    ... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Clean Water Act and Safe Drinking Water Act Notice is hereby given that on November 21, 2011, a proposed Consent Decree (``proposed... penalties under the Clean Water Act, 33 U.S.C. 1251-387; the Safe Drinking Water Act, 42 U.S.C. 300f-300j-26...

  4. Light water ultra-safe plant concept

    International Nuclear Information System (INIS)

    Klevans, E.

    1989-01-01

    Since the accident at Three Mile Island (TMI), Penn State Nuclear Engineering Department Faculty and Staff have considered various methods to improve already safe reactor designs and public perception of the safety of Nuclear Power. During 1987 and 1988, the Department of Energy provided funds to the Nuclear Engineering Department at Penn State to investigate a plant reconfiguration originated by M.A. Schultz called ''The Light Water Ultra-Safe Plant Concept''. This report presents a final summary of the project with references to several masters' theses and addendum reports for further detail. The two year research effort included design verification with detailed computer simulation of: (a) normal operation characteristics of the unique pressurizing concept, (b) severe transients without loss of coolant, (c) combined primary and secondary system modeling, and (d) small break and large break loss of coolant accidents. Other studies included safety analysis, low power density core design, and control system design to greatly simplify the control room and required operator responses to plant upset conditions. The overall conclusion is that a reconfigured pressurized water reactor can achieve real and perceived safety improvements. Additionally, control system research to produce greatly simplified control rooms and operator requirements should be continued in future projects

  5. Arsenic-safe drinking water and antioxidants for the management of arsenicosis patients

    Directory of Open Access Journals (Sweden)

    Salamat Khandker, Ranjit Kumar Dey, AZM Maidul Islam, Sheikh Akhtar Ahmad and Ifthaker-Al-Mahmud

    2006-12-01

    Full Text Available The role of arsenic-safe drinking water and antioxidants in the management of arsenicosis patients were observed. Two hundred and fifty patients of arsenicosis from an arsenic-affected area of Bangladesh were included and divided into five groups based on the source of drinking water (green- or red-marked tube well and intake of antioxidants (vitamin A, C and E. Melanosis improved in 43 patients of the group who took arsenic-safe drinking water from green-marked tube well and antioxidants regularly. Patients of the group who took green-marked tube well water regularly but not the antioxidant showed improvement in melanosis in 22 cases. The respondents who were using red-marked tube well water and antioxidants, only two of them improved; and all other respondents either deteriorated or did not improve. The respondents who were using red-marked tube well water but not the antioxidant, none did show any improvement of their illness. The respondents who took antioxidants irregularly and had irregular intake of safe water, were not considered to compare the prognosis of skin lesions. Regarding keratosis, the respondents who took green-marked tube well water regularly and antioxidant regularly, 8 of them improved, 1 case didn’t change; while the respondents who took green-marked tube well water regularly but not the antioxidant, 8 cases didn’t improve much but majority of them remain unchanged. Among the respondents of other groups, keratosis deteriorated. This study suggests that both arsenic-safe drinking water and use of antioxidants gave good result in improvement of the arsenicosis.

  6. Economic performance of water storage capacity expansion for food security

    Science.gov (United States)

    Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.

    2013-03-01

    SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.

  7. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  8. Water security for productive economies: Applying an assessment framework in southern Africa

    Science.gov (United States)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-08-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.

  9. Keep Food, Water, and Medications Safe PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2017-10-25

    This 60 second public service announcement is about the need to keep food, water and medications safe after a disaster.  Created: 10/25/2017 by Centers for Disease Control and Prevention (CDC).   Date Released: 10/25/2017.

  10. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  11. Impact of water scarcity on food security at micro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  12. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  13. Impact of water scarcity on food security at meso level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  14. Definition of the «Economic Security of an Enterprise» and «Safe Development of an Enterprise» Notions

    Directory of Open Access Journals (Sweden)

    Yefimova Ganna V.

    2013-11-01

    Full Text Available The necessity of this study is explained by difference of opinions regarding understanding of the “economic security of an enterprise” notion, on the one hand, and the poorly studied issue of a combination of the process of enterprise development with a necessary task of ensuring a high level of its economic security, on the other hand. Analysing, systemising and generalising results of scientific studies, the article identifies that economic security of an enterprise is an economic category, which characterises the enterprise functioning conditions. Favourable conditions of functioning ensure a high level of stability and steadiness of an enterprise and its ability of self-realisation and expanded self-reproduction. This becomes possible if an enterprise is capable of resisting external threats and preventing internal ones. Since development of an enterprise is an objective process, which takes place under conditions of uncertainty and changeability of external and internal environments, it is accompanied with a system of threats, which the system of economic security should protect an enterprise from. Taking into account the above, safe development of an enterprise is a process of consecutive transitions of the economic system from one state to another, which is not of a poorer quality than a previous one, which envisages producing new goals and creation of safe conditions for transition from one specific goal, achieved in the process of enterprise functioning, to another. The proposed definitions allow consideration of such significant issues of methodology of management of safe development of an enterprise as the diagnostics of its level and planning.

  15. Linking smallholder agriculture and water to household food security ...

    African Journals Online (AJOL)

    Linking smallholder agriculture and water to household food security and nutrition. ... Promoting household food security and reducing malnutrition rates of a growing population with the same amount of water is ... AJOL African Journals Online.

  16. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  17. Why water security is crucial to you

    CSIR Research Space (South Africa)

    Meissner, Richard

    2015-07-01

    Full Text Available Water security and the appropriate management of water resources are vitally important to South Africa, its population and the economy. According to the Department of Water and Sanitation’s 2013 Strategic Overview of the Water Sector in South Africa...

  18. Lower Colorado River GRP Public Water System Intakes, Nevada, 2012, Nevada Division of Environmental Protection Bureau of Safe Drinking Water

    Data.gov (United States)

    U.S. Environmental Protection Agency — Public Water System wells, springs an intake locations are collected and maintained by NDEP Bureau of Safe Drinking Water (BSDW). The data is kept in the Safe...

  19. Lower Colorado River GRP Public Water System Springs, Nevada, 2012, Nevada Division of Environmental Protection Bureau of Safe Drinking Water

    Data.gov (United States)

    U.S. Environmental Protection Agency — Public Water System wells, springs an intake locations are collected and maintained by NDEP Bureau of Safe Drinking Water (BSDW). The data is kept in the Safe...

  20. Lower Colorado River GRP Public Water System Wells, Nevada, 2012, Nevada Division of Environmental Protection Bureau of Safe Drinking Water

    Data.gov (United States)

    U.S. Environmental Protection Agency — Public Water System wells, springs an intake locations are collected and maintained by NDEP Bureau of Safe Drinking Water (BSDW). The data is kept in the Safe...

  1. Accounting for water quality in monitoring access to safe drinking-water as part of the Millennium Development Goals: lessons from five countries.

    Science.gov (United States)

    Bain, Rob E S; Gundry, Stephen W; Wright, Jim A; Yang, Hong; Pedley, Steve; Bartram, Jamie K

    2012-03-01

    To determine how data on water source quality affect assessments of progress towards the 2015 Millennium Development Goal (MDG) target on access to safe drinking-water. Data from five countries on whether drinking-water sources complied with World Health Organization water quality guidelines on contamination with thermotolerant coliform bacteria, arsenic, fluoride and nitrates in 2004 and 2005 were obtained from the Rapid Assessment of Drinking-Water Quality project. These data were used to adjust estimates of the proportion of the population with access to safe drinking-water at the MDG baseline in 1990 and in 2008 made by the Joint Monitoring Programme for Water Supply and Sanitation, which classified all improved sources as safe. Taking account of data on water source quality resulted in substantially lower estimates of the percentage of the population with access to safe drinking-water in 2008 in four of the five study countries: the absolute reduction was 11% in Ethiopia, 16% in Nicaragua, 15% in Nigeria and 7% in Tajikistan. There was only a slight reduction in Jordan. Microbial contamination was more common than chemical contamination. The criterion used by the MDG indicator to determine whether a water source is safe can lead to substantial overestimates of the population with access to safe drinking-water and, consequently, also overestimates the progress made towards the 2015 MDG target. Monitoring drinking-water supplies by recording both access to water sources and their safety would be a substantial improvement.

  2. Security management of water supply

    Directory of Open Access Journals (Sweden)

    Tchórzewska-Cieślak Barbara

    2017-03-01

    Full Text Available The main aim of this work is to present operational problems concerning the safety of the water supply and the procedures for risk management systems functioning public water supply (CWSS and including methods of hazard identification and risk assessment. Developed a problem analysis and risk assessment, including procedures called. WSP, which is recommended by the World Health Organization (WHO as a tool for comprehensive security management of water supply from source to consumer. Water safety plan is a key element of the strategy for prevention of adverse events in CWSS.

  3. Perspectives on water security in the South African context

    CSIR Research Space (South Africa)

    Funke, Nicola S

    2017-12-01

    Full Text Available This presentation focuses on different perspectives of water security in the South Africa context. The authors link a number of key international perspectives on the topic of water security to official South African government and academic discourse...

  4. Accounting for water quality in monitoring access to safe drinking-water as part of the Millennium Development Goals: lessons from five countries

    Science.gov (United States)

    Bain, Rob ES; Wright, Jim A; Yang, Hong; Pedley, Steve; Bartram, Jamie K

    2012-01-01

    Abstract Objective To determine how data on water source quality affect assessments of progress towards the 2015 Millennium Development Goal (MDG) target on access to safe drinking-water. Methods Data from five countries on whether drinking-water sources complied with World Health Organization water quality guidelines on contamination with thermotolerant coliform bacteria, arsenic, fluoride and nitrates in 2004 and 2005 were obtained from the Rapid Assessment of Drinking-Water Quality project. These data were used to adjust estimates of the proportion of the population with access to safe drinking-water at the MDG baseline in 1990 and in 2008 made by the Joint Monitoring Programme for Water Supply and Sanitation, which classified all improved sources as safe. Findings Taking account of data on water source quality resulted in substantially lower estimates of the percentage of the population with access to safe drinking-water in 2008 in four of the five study countries: the absolute reduction was 11% in Ethiopia, 16% in Nicaragua, 15% in Nigeria and 7% in Tajikistan. There was only a slight reduction in Jordan. Microbial contamination was more common than chemical contamination. Conclusion The criterion used by the MDG indicator to determine whether a water source is safe can lead to substantial overestimates of the population with access to safe drinking-water and, consequently, also overestimates the progress made towards the 2015 MDG target. Monitoring drinking-water supplies by recording both access to water sources and their safety would be a substantial improvement. PMID:22461718

  5. Reduction in fluoride-induced genotoxicity in mouse bone marrow cells after substituting high fluoride-containing water with safe drinking water.

    Science.gov (United States)

    Podder, Santosh; Chattopadhyay, Ansuman; Bhattacharya, Shelley

    2011-10-01

    Treatment of mice with 15 mg l(-1) sodium fluoride (NaF) for 30 days increased the number of cell death, chromosomal aberrations (CAs) and 'cells with chromatid breaks' (aberrant cells) compared with control. The present study was intended to determine whether the fluoride (F)-induced genotoxicity could be reduced by substituting high F-containing water after 30 days with safe drinking water, containing 0.1 mg F ions l(-1). A significant fall in percentage of CAs and aberrant cells after withdrawal of F-treatment following 30 days of safe water treatment in mice was observed which was highest after 90 days, although their levels still remained significantly high compared with the control group. This observation suggests that F-induced genotoxicity could be reduced by substituting high F-containing water with safe drinking water. Further study is warranted with different doses and extended treatment of safe water to determine whether the induced damages could be completely reduced or not. Copyright © 2011 John Wiley & Sons, Ltd.

  6. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  7. Agricultural Production, Food and Nutrition Security in Rural Benin ...

    African Journals Online (AJOL)

    Agricultural Production, Food and Nutrition Security in Rural Benin, Nigeria. ... that rural-urban migration results in shortage of manpower for agricultural activities. ... to support education, health care, sanitation and safe drinking water supply.

  8. A collection of publications and articles for a light water ultra-safe plant concept

    International Nuclear Information System (INIS)

    Klevans, E.H.

    1988-01-01

    This collection contains reports titled: ''The Penn State Ultra-Safe Reactor Concept; '' ''Ultra Safe Nuclear Power; '' ''Use of the Modular Modeling System, in the Design of the Penn State Advanced Light Water Reactor; '' ''Use of the Modular Modeling System in Severe Transient Analysis of Penn State Advanced Light Water Reactor; '' ''PSU Engineers' Reactor Design May Stop a Future TMI; '' and ''The Penn State Advanced Light Water reactor Concept.''

  9. Cogeneration of Electricity and Potable Water Using The International Reactor Innovative And Secure (IRIS) Design

    International Nuclear Information System (INIS)

    Ingersoll, D.T.; Binder, J.L.; Kostin, V.I.; Panov, Y.K.; Polunichev, V.; Ricotti, M.E.; Conti, D.; Alonso, G.

    2004-01-01

    The worldwide demand for potable water has been steadily growing and is projected to accelerate, driven by a continued population growth and industrialization of emerging countries. This growth is reflected in a recent market survey by the World Resources Institute, which shows a doubling in the installed capacity of seawater desalination plants every ten years. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh/m3 of produced desalted water. At current U.S. water use rates, a dedicated 1000 MW power plant for every one million people would be required to meet our water needs with desalted water. Nuclear energy plants are attractive for large scale desalination application. The thermal energy produced in a nuclear plant can provide both electricity and desalted water without the production of greenhouse gases. A particularly attractive option for nuclear desalination is to couple a desalination plant with an advanced, modular, passively safe reactor design. The use of small-to-medium sized nuclear power plants allows for countries with smaller electrical grid needs and infrastructure to add new electrical and water capacity in more appropriate increments and allows countries to consider siting plants at a broader number of distributed locations. To meet these needs, a modified version of the International Reactor Innovative and Secure (IRIS) nuclear power plant design has been developed for the cogeneration of electricity and desalted water. The modular, passively safe features of IRIS make it especially well adapted for this application. Furthermore, several design features of the IRIS reactor will ensure a safe and reliable source of energy and water even for countries with limited nuclear power experience and infrastructure. The IRIS-D design utilizes low-quality steam extracted from the low-pressure turbine to boil seawater in a multi-effect distillation desalination plant. The desalination plant is based on the horizontal

  10. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  11. Water security begins and ends with the individual

    CSIR Research Space (South Africa)

    Meissner, Richard

    2015-08-01

    Full Text Available Water security and the appropriate management of water resources are vitally important to South Africa, its population and the economy. According to the Department of Water and Sanitation’s 2013 Strategic Overview of the Water Sector in South Africa...

  12. Sustainable Supply of Safe Drinking Water for Underserved Households in Kenya: Investigating the Viability of Decentralized Solutions

    Directory of Open Access Journals (Sweden)

    Pauline Chepchirchir Cherunya

    2015-10-01

    Full Text Available Water quality and safe water sources are pivotal aspects of consideration for domestic water. Focusing on underserved households in Kenya, this study compared user perceptions and preferences on water-service provision options, particularly investigating the viability of decentralized models, such as the Safe Water Enterprise (SWE, as sustainable safe drinking water sources. Results showed that among a number of water-service provision options available, the majority of households regularly sourced their domestic water from more than one source (86% Ngoliba/Maguguni, 98% Kangemi Gichagi. A majority of households perceived their water sources to be unsafe to drink (84% Ngoliba/Maguguni, 73% Kangemi Gichagi. For this reason, drinking water was mainly chlorinated (48% Ngoliba/Maguguni, 33% Kangemi Gichagi or boiled (42% Ngoliba/Maguguni, 67% Kangemi Gichagi. However, this study also found that households in Kenya did not apply these household water treatment methods consistently, thus indicating inconsistency in safe water consumption. The SWE concept, a community-scale decentralized safe drinking water source, was a preferred option among households who perceived it to save time and to be less cumbersome as compared to boiling and chlorination. Willingness to pay for SWE water was also a positive indicator for its preference by the underserved households. However, the long-term applicability of such decentralized water provision models needs to be further investigated within the larger water-service provision context.

  13. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  14. Sunshine and saris equals safe drinking water | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    9 juin 2016 ... Researchers from Canada and India funded by IDRC have found that filtering water through sari-cloth before purifying it in the sun's heat makes polluted water safe to drink. ... Avec plus de 1,2 milliard d'habitants, la population de l'Inde ne cesse de croître et, par le fait même, de transformer le pays.

  15. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    Science.gov (United States)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  16. Full Scale Drinking Water System Decontamination at the Water Security Test Bed

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA’s Water Security Test Bed (WSTB) facility is a full-scale representation of a drinking water distribution system. In collaboration with the Idaho National...

  17. Food and water security issues in Russia II: water security in general population of Russian Arctic, Siberia and Far East, 2000-2011.

    Science.gov (United States)

    Dudarev, Alexey A; Dushkina, Eugenia V; Sladkova, Yuliya N; Alloyarov, Pavel R; Chupakhin, Valery S; Dorofeyev, Vitaliy M; Kolesnikova, Tatjana A; Fridman, Kirill B; Evengard, Birgitta; Nilsson, Lena M

    2013-01-01

    Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Uniform water security indicators collected from Russian official statistical sources for the period 2000-2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized--underground and surface, and non-centralized) and of drinking water. Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40-80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32-90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5-12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages--0.2-2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus

  18. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  19. Choosing and Using Safe Water Technologies: Evidence from a Field Experiment in Kenya

    OpenAIRE

    Luoto, Jill Emily

    2010-01-01

    This dissertation examines the decision-making of poor rural Kenyan households with respect to the adoption of point-of-use (POU) safe water technologies designed to expand access to safe drinking water in the developing world. Low-cost POU products such as chlorine and filters substantially reduce diarrhea, which kills two million children in poor countries each year. Nevertheless, POU products remain little used in many parts of the developing world, even when they are widely available at s...

  20. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  1. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  2. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  3. Improved but unsustainable: accounting for sachet water in post-2015 goals for global safe water.

    Science.gov (United States)

    Stoler, Justin

    2012-12-01

    The advent and rapid spread of sachet drinking water in West Africa presents a new challenge for providing sustainable access to global safe water. Sachet water has expanded drinking water access and is often of sufficient quality to serve as an improved water source for Millennium Development Goals (MDG) monitoring purposes, yet sachets are an unsustainable water delivery vehicle due to their overwhelming plastic waste burden. Monitoring of primary drinking water sources in West Africa generally ignores sachet water, despite its growing ubiquity. Sub-Saharan Africa as a region is unlikely to meet the MDG Target for drinking water provision, and post-2015 monitoring activities may depend upon rapid adaptability to local drinking water trends. © 2012 Blackwell Publishing Ltd.

  4. Light water ultra-safe plant concept: First annual report

    International Nuclear Information System (INIS)

    Klevans, E.

    1987-01-01

    Since the accident at Three Mile Island (TMI) Penn State Nuclear Engineering Department Faculty and Staff have considered various methods to improve already safe reactor designs and public perception of the safety of Nuclear Power. During the last year, the Department of Energy funded the study of a plant reconfiguration originally proposed by M.A. Shultz. This report presents the status of the project at the end of the first year. A broad set of specifications to improve safety and public perception were set forth and the realization of these goals is achieved in a plant design named, ''The Light Water Ultra-Safe Plant Concept.'' The most significant goals of the concept address the station black-out problem and simplification of required operator actions during abnormal situations. These goals are achieved in the Ultra-Safe Concept by addition of an in-containment atmospheric tank containing a large quantity of cool water, replacement of the conventional PWR pressurizer system with a pressurizing pump, internal emergency power generation, and arrangement of components to utilize natural circulation at shut-down. The first year effort included an evaluation of the normal operation characteristics of the primary system pressurizing concept, evaluating parameters and modeling for analysis of the shutdown scenario, design of a low power density core, design of a low-pressure waste handling system, arrangement of a drainage system for pipe break considerations, and failure modes and effects analysis

  5. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  6. Ensuring safe water in post-chemical, biological, radiological and nuclear emergencies

    Science.gov (United States)

    Amar, Praveen Kumar

    2010-01-01

    Disaster scenarios are dismal and often result in mass displacement and migration of people. In eventuality of emergency situations, people need to be rehabilitated and provided with an adequate supply of drinking water, the most essential natural resource needed for survival, which is often not easily available even during non-disaster periods. In the aftermath of a natural or human-made disaster affecting mankind and livestock, the prime aim is to ensure supply of safe water to reduce the occurrence and spread of water borne disease due to interrupted, poor and polluted water supply. Chemical, biological, radiological and nuclear (CBRN) emergencies augment the dilemma as an additional risk of “contamination” is added. The associated risks posed to health and life should be reduced to as low as reasonably achievable. Maintaining a high level of preparedness is the crux of quick relief and efficient response to ensure continuous supply of safe water, enabling survival and sustenance. The underlying objective would be to educate and train the persons concerned to lay down the procedures for the detection, cleaning, and treatment, purification including desalination, disinfection, and decontamination of water. The basic information to influence the organization of preparedness and execution of relief measures at all levels while maintaining minimum standards in water management at the place of disaster, are discussed in this article. PMID:21829321

  7. Ensuring safe water in post-chemical, biological, radiological and nuclear emergencies

    Directory of Open Access Journals (Sweden)

    Praveen Kumar Amar

    2010-01-01

    Full Text Available Disaster scenarios are dismal and often result in mass displacement and migration of people. In eventuality of emergency situations, people need to be rehabilitated and provided with an adequate supply of drinking water, the most essential natural resource needed for survival, which is often not easily available even during non-disaster periods. In the aftermath of a natural or human-made disaster affecting mankind and livestock, the prime aim is to ensure supply of safe water to reduce the occurrence and spread of water borne disease due to interrupted, poor and polluted water supply. Chemical, biological, radiological and nuclear (CBRN emergencies augment the dilemma as an additional risk of "contamination" is added. The associated risks posed to health and life should be reduced to as low as reasonably achievable. Maintaining a high level of preparedness is the crux of quick relief and efficient response to ensure continuous supply of safe water, enabling survival and sustenance. The underlying objective would be to educate and train the persons concerned to lay down the procedures for the detection, cleaning, and treatment, purification including desalination, disinfection, and decontamination of water. The basic information to influence the organization of preparedness and execution of relief measures at all levels while maintaining minimum standards in water management at the place of disaster, are discussed in this article.

  8. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  9. Desalination and Water Security: The Promise and Perils of a Technological Fix to the Water Crisis in Baja California Sur, Mexico

    Directory of Open Access Journals (Sweden)

    Jamie McEvoy

    2014-10-01

    Full Text Available Across the globe, desalination is increasingly being considered as a new water supply source. This article examines how the introduction of desalinated water into the municipal water supply portfolio has affected water security in the coastal tourist city of Cabo San Lucas in Baja California Sur (BCS, Mexico. It also analyses the competing discourses surrounding desalination in the region and discusses alternative water management options for achieving water security. This article challenges the notion that desalination is an appropriate and sufficient technological solution for arid regions. The findings provide evidence of increased yet delimited water security at a neighbourhood scale while identifying new vulnerabilities related to desalination, particularly in the context of the global South. This article concludes that implementing a technological fix on top of a water management system that is plagued with more systemic and structural problems does little to improve long-term water management and is likely to foreclose or forestall other water management options. This multi-scalar analysis contributes to the emerging literature on water security by considering both a narrow and broad framing of water security and identifying a range of factors that influence water security.

  10. AFRICOM’s Role in Water Security

    Science.gov (United States)

    2012-06-01

    Niger River Basin,” USAID, December 2011, 16. 12. Roselle Henn et al., “The impact of Water as a United States Government Security Consideration for...Tensions,” A report to the German Advisory Council on Global Change, July 10, 2006, 3. 17. Ibid., 6. 18. Roselle Henn, et al., “The impact of Water as

  11. Water security for productive economies : Applying an assessment framework in southern Africa

    NARCIS (Netherlands)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-01-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook

  12. Food and water security issues in Russia II: Water security in general population of Russian Arctic, Siberia and Far East, 2000–2011

    Directory of Open Access Journals (Sweden)

    Alexey A. Dudarev

    2013-12-01

    Full Text Available Background . Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods . Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized and of drinking water. Results . Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources are highly contaminated by chemicals (up to 40–80% and biological agents (up to 55% in some regions, mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51% were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12% everywhere except Evenki AO (27%, and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly. The presence of other agents was much lower: Coliphages

  13. Food and water security issues in Russia II: Water security in general population of Russian Arctic, Siberia and Far East, 2000–2011

    Science.gov (United States)

    Dudarev, Alexey A.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatjana A.; Fridman, Kirill B.; Evengard, Birgitta; Nilsson, Lena M.

    2013-01-01

    Background Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized) and of drinking water. Results Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40–80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages – 0.2–2

  14. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  15. The Dutch secret: how to provide safe drinking water without chlorine in the Netherlands

    Directory of Open Access Journals (Sweden)

    G. J. Medema

    2009-03-01

    Full Text Available The Netherlands is one of the few countries where chlorine is not used at all, neither for primary disinfection nor to maintain a residual disinfectant in the distribution network. The Dutch approach that allows production and distribution of drinking water without the use of chlorine while not compromising microbial safety at the tap, can be summarized as follows:
    1. Use the best source available, in order of preference:
        – microbiologically safe groundwater,
        – surface water with soil passage such as artificial recharge or bank filtration,
        – direct treatment of surface water in a multiple barrier treatment;
    2. Use a preferred physical process treatment such as sedimentation, filtration and UV-disinfection. If absolutely necessary, also oxidation by means of ozone or peroxide can be used, but chlorine is avoided;
    3. Prevent ingress of contamination during distribution;
    4. Prevent microbial growth in the distribution system by production and distribution of biologically stable (biostable water and the use of biostable materials;
    5. Monitor for timely detection of any failure of the system to prevent significant health consequences.

    New developments in safe drinking water in the Netherlands include the adaptation of the Dutch drinking water decree, implementation of quantitative microbial risk assessment (QMRA by water companies and research into source water quality, drinking water treatment efficacy, safe distribution and biostability of drinking water during distribution and Legionella. This paper summarizes how the Dutch water companies warrant the safety of the drinking water without chlorine.

  16. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  17. Organising a safe space for navigating social-ecological transformations to sustainability

    OpenAIRE

    Pereira, L.; Karpouzoglou, T.D.; Doshi, S.; Frantzeskaki, N.

    2015-01-01

    textabstractThe need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. Howeve...

  18. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.J.; Bastiaansen, H.J.M.; Berg, J. van den; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two bigchallenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  19. Evaluation of Water Resource Security Based on an MIV-BP Model in a Karst Area

    Directory of Open Access Journals (Sweden)

    Liying Liu

    2018-06-01

    Full Text Available Evaluation of water resource security deserves particular attention in water resource planning and management. A typical karst area in Guizhou Province, China, was used as the research area in this paper. First, based on data from Guizhou Province for the past 10 years, the mean impact value–back propagation (MIV-BP model was used to analyze the factors influencing water resource security in the karst area. Second, 18 indices involving five aspects, water environment subsystem, social subsystem, economic subsystem, ecological subsystem, and human subsystem, were selected to establish an evaluation index of water resource security. Finally, a BP artificial neural network model was constructed to evaluate the water resource security of Guizhou Province from 2005 to 2014. The results show that water resource security in Guizhou, which was at a moderate warning level from 2005 to 2009 and a critical safety level from 2010 to 2014, has generally improved. Groundwater supply ratio, industrial water utilization rate, water use efficiency, per capita grain production, and water yield modulus were the obstacles to water resource security. Driving factors were comprehensive utilization rate of industrial solid waste, qualifying rate of industrial wastewater, above moderate rocky desertification area ratio, water requirement per unit gross domestic product (GDP, and degree of development and utilization of groundwater. Our results provide useful suggestions on the management of water resource security in Guizhou Province and a valuable reference for water resource research.

  20. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.; Bastiaansen, H.; Van den Berg, J.; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  1. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  2. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  3. Water security in South Africa: perceptions on public expectations ...

    African Journals Online (AJOL)

    Water security in South Africa: perceptions on public expectations and municipal ... will in government, a need to restore citizen trust in government intention and capability ... services, and a failure to up-scale existing water re-use technology.

  4. Climate Change Adaptation, Water, and Food Security in Pakistan ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Climate Change Adaptation, Water, and Food Security in Pakistan ... those living in the Indus floodplains or on the edges of its deserts - received little attention. ... farmers' decision-making in water stressed regions, and the wider political and ...

  5. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-1038] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a...

  6. Inherently safe light water reactors

    International Nuclear Information System (INIS)

    Ise, Takeharu

    1987-01-01

    Today's large nuclear power reactors of world-wise use have been designed based on the philosophy. It seems that recent less electricity demand rates, higher capital cost and the TMI accident let us acknowledge relative small and simplified nuclear plants with safer features, and that Chernobyl accident in 1983 underlines the needs of intrinsic and passive safety characteristics. In such background, several inherently safe reactor concepts have been presented abroad and domestically. First describing 'Can inherently safe reactors be designed,' then I introduce representative reactor concepts of inherently safe LWRs advocated abroad so far. All of these innovative reactors employ intrinsic and passive features in their design, as follows: (1) PIUS, an acronym for Process Inherent Ultimate Safety, or an integral PWR with passive heat sink and passive shutdown mechanism, advocated by ASEA-ATOM of Sweden. (2) MAP(Minimum Attention Plant), or a self-pressurized, natural circulation integral PWR, promoted by CE Inc. of the U.S. (3) TPS(TRIGA Power System), or a compact PWR with passive heat sink and inherent fuel characteristics of large prompt temperature coefficient, prompted by GA Technologies Inc. of the U.S. (4) PIUS-BWR, or an inherently safe BWR employing passively actuated fluid valves, in competition with PIUS, prompted by ORNL of the U.S. Then, I will describe the domestic trends in Japan and the innovative inherently safe LWRs presented domestically so far. (author)

  7. The challenge of improving boiling: lessons learned from a randomized controlled trial of water pasteurization and safe storage in Peru.

    Science.gov (United States)

    Heitzinger, K; Rocha, C A; Quick, R E; Montano, S M; Tilley, D H; Mock, C N; Carrasco, A J; Cabrera, R M; Hawes, S E

    2016-07-01

    Boiling is the most common method of household water treatment in developing countries; however, it is not always effectively practised. We conducted a randomized controlled trial among 210 households to assess the effectiveness of water pasteurization and safe-storage interventions in reducing Escherichia coli contamination of household drinking water in a water-boiling population in rural Peru. Households were randomized to receive either a safe-storage container or a safe-storage container plus water pasteurization indicator or to a control group. During a 13-week follow-up period, households that received a safe-storage container and water pasteurization indicator did not have a significantly different prevalence of stored drinking-water contamination relative to the control group [prevalence ratio (PR) 1·18, 95% confidence interval (CI) 0·92-1·52]. Similarly, receipt of a safe-storage container alone had no effect on prevalence of contamination (PR 1·02, 95% CI 0·79-1·31). Although use of water pasteurization indicators and locally available storage containers did not increase the safety of household drinking water in this study, future research could illuminate factors that facilitate the effective use of these interventions to improve water quality and reduce the risk of waterborne disease in populations that boil drinking water.

  8. Exploring water and food security: the water footprint of domestic food production in the Gaza Strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Dotelli, Giovanni; Melià, Paco

    2016-04-01

    Water scarcity and food security are major issues in the Gaza Strip. This area is characterized by one of the highest densities in the world and it is affected by both severe scarcity of water resources and limited trading possibilities.Given this context, the enhancement of domestic food production is considered a fundamental strategy in achieving food security in the area. For this reason, rural people play a crucial role in implementing sustainable strategies for enhancing the domestic food production while preserving water resources. In order to investigate the effectiveness of existing agricultural scenarios in achieving food security in a sustainable manner, we propose a framework to assess food production systems in terms of their contribution to the nutritional and economic conditions of rural households and their impact on water resources. In particular, the latter has been carried out through the water footprint indicator proposed by the Water Footprint Network. The case study analyzed is a sample farm located in the Gaza Strip, whose food production is based on horticulture, animal husbandry and aquaculture. The study is articulated into two main parts: first, we compare alternative scenarios of vegetal and animal food production in terms of food supply, water consumption and economic income at the household scale; then, we extend the analysis to evaluate the potential contribution of domestic food production to the food security in the whole Gaza Strip, focusing on the nutritional dimension, and providing a preliminary assessment of the environmental and economic sustainability. In particular, we evaluate water appropriation for domestic food production and compare it with the availability of water resources in the region. The outcomes highlight that the domestic food production can potentially satisfy both a basic diet and economic income for rural household, but the related appropriation of freshwater results unsustainable with respect to the fresh

  9. From safe yield to sustainable development of water resources - The Kansas experience

    Science.gov (United States)

    Sophocleous, M.

    2000-01-01

    This paper presents a synthesis of water sustainability issues from the hydrologic perspective. It shows that safe yield is a flawed concept and that sustainability is an idea that is broadly used but perhaps not well understood. In general, the sustainable yield of an aquifer must be considerably less than recharge if adequate amounts of water are to be available to sustain both the quantity and quality of streams, springs, wetlands, and ground-water-dependent ecosystems. To ensure sustainability, it is imperative that water limits be established based on hydrologic principles of mass balance. To establish water-use policies and planning horizons, the transition curves of aquifer systems from ground-water storage depletion to induced recharge of surface water need to be developed. Present-day numerical models are capable of generating such transition curves. Several idealized examples of aquifer systems show how this could be done. Because of the complexity of natural systems and the uncertainties in characterizing them, the current philosophy underlying sustainable management of water resources is based on the interconnected systems approach and on adaptive management. Examples of water-resources management from Kansas illustrate some of these concepts in a real-world setting. Some of the hallmarks of Kansas water management are the formation of local ground-water management districts, the adoption of minimum streamflow standards, the use of modified safe-yield policies in some districts, the implementation of integrated resource planning by the City of Wichita, and the subbasin water-resources management program in potential problem areas. These are all appropriate steps toward sustainable development. The Kansas examples show that local decision-making is the best way to fully account for local variability in water management. However, it is imperative that public education and involvement be encouraged, so that system complexities and constraints are better

  10. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  11. A Quantitative Socio-hydrological Characterization of Water Security in Large-Scale Irrigation Systems

    Science.gov (United States)

    Siddiqi, A.; Muhammad, A.; Wescoat, J. L., Jr.

    2017-12-01

    Large-scale, legacy canal systems, such as the irrigation infrastructure in the Indus Basin in Punjab, Pakistan, have been primarily conceived, constructed, and operated with a techno-centric approach. The emerging socio-hydrological approaches provide a new lens for studying such systems to potentially identify fresh insights for addressing contemporary challenges of water security. In this work, using the partial definition of water security as "the reliable availability of an acceptable quantity and quality of water", supply reliability is construed as a partial measure of water security in irrigation systems. A set of metrics are used to quantitatively study reliability of surface supply in the canal systems of Punjab, Pakistan using an extensive dataset of 10-daily surface water deliveries over a decade (2007-2016) and of high frequency (10-minute) flow measurements over one year. The reliability quantification is based on comparison of actual deliveries and entitlements, which are a combination of hydrological and social constructs. The socio-hydrological lens highlights critical issues of how flows are measured, monitored, perceived, and experienced from the perspective of operators (government officials) and users (famers). The analysis reveals varying levels of reliability (and by extension security) of supply when data is examined across multiple temporal and spatial scales. The results shed new light on evolution of water security (as partially measured by supply reliability) for surface irrigation in the Punjab province of Pakistan and demonstrate that "information security" (defined as reliable availability of sufficiently detailed data) is vital for enabling water security. It is found that forecasting and management (that are social processes) lead to differences between entitlements and actual deliveries, and there is significant potential to positively affect supply reliability through interventions in the social realm.

  12. Water security at local government level. What do people think it means in eThekwini?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available aspects Negative aspects Helping municipalities to help themselves Working together we can secure our water future Diverse - from national government to local community and NGO People should get involved in securing their own water, for example... secure future Scientists from government, NGO's academia Good water quality will ensure healthy people, environments and livelihoods for now and in the future Surely mines can't use good quality water More for some (forever?) A water supply...

  13. Integrating Infrastructure and Institutions for Water Security in Large Urban Areas

    Science.gov (United States)

    Padowski, J.; Jawitz, J. W.; Carrera, L.

    2015-12-01

    Urban growth has forced cities to procure more freshwater to meet demands; however the relationship between urban water security, water availability and water management is not well understood. This work quantifies the urban water security of 108 large cities in the United States (n=50) and Africa (n=58) based on their hydrologic, hydraulic and institutional settings. Using publicly available data, urban water availability was estimated as the volume of water available from local water resources and those captured via hydraulic infrastructure (e.g. reservoirs, wellfields, aqueducts) while urban water institutions were assessed according to their ability to deliver, supply and regulate water resources to cities. When assessing availability, cities relying on local water resources comprised a minority (37%) of those assessed. The majority of cities (55%) instead rely on captured water to meet urban demands, with African cities reaching farther and accessing a greater number and variety of sources for water supply than US cities. Cities using captured water generally had poorer access to local water resources and maintained significantly more complex strategies for water delivery, supply and regulatory management. Eight cities, all African, are identified in this work as having water insecurity issues. These cities lack sufficient infrastructure and institutional complexity to capture and deliver adequate amounts of water for urban use. Together, these findings highlight the important interconnection between infrastructure investments and management techniques for urban areas with a limited or dwindling natural abundance of water. Addressing water security challenges in the future will require that more attention be placed not only on increasing water availability, but on developing the institutional support to manage captured water supplies.

  14. A blue/green water-based accounting framework for assessment of water security

    Science.gov (United States)

    Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.

    2014-09-01

    A comprehensive assessment of water security can incorporate several water-related concepts, while accounting for Blue and Green Water (BW and GW) types defined in accordance with the hydrological processes involved. Here we demonstrate how a quantitative analysis of provision probability and use of BW and GW can be conducted, so as to provide indicators of water scarcity and vulnerability at the basin level. To illustrate the approach, we use the Soil and Water Assessment Tool (SWAT) to model the hydrology of an agricultural basin (291 km2) within the Cantareira Water Supply System in Brazil. To provide a more comprehensive basis for decision making, we analyze the BW and GW-Footprint components against probabilistic levels (50th and 30th percentile) of freshwater availability for human activities, during a 23 year period. Several contrasting situations of BW provision are distinguished, using different hydrological-based methodologies for specifying monthly Environmental Flow Requirements (EFRs), and the risk of natural EFR violation is evaluated by use of a freshwater provision index. Our results reveal clear spatial and temporal patterns of water scarcity and vulnerability levels within the basin. Taking into account conservation targets for the basin, it appears that the more restrictive EFR methods are more appropriate than the method currently employed at the study basin. The blue/green water-based accounting framework developed here provides a useful integration of hydrologic, ecosystem and human needs information on a monthly basis, thereby improving our understanding of how and where water-related threats to human and aquatic ecosystem security can arise.

  15. Applications for remotely sensed evapotranspiration data in monitoring water quality, water use, and water security

    Science.gov (United States)

    Anderson, Martha; Hain, Christopher; Feng, Gao; Yang, Yun; Sun, Liang; Yang, Yang; Dulaney, Wayne; Sharifi, Amir; Kustas, William; Holmes, Thomas

    2017-04-01

    Across the globe there are ever-increasing and competing demands for freshwater resources in support of food production, ecosystems services and human/industrial consumption. Recent studies using the GRACE satellite have identified severely stressed aquifers that are being unsustainably depleted due to over-extraction, primarily in support of irrigated agriculture. In addition, historic droughts and ongoing political conflicts threaten food and water security in many parts of the world. To facilitate wise water management, and to develop sustainable agricultural systems that will feed the Earth's growing population into the future, there is a critical need for robust assessments of daily water use, or evapotranspiration (ET), over a wide range in spatial scales - from field to globe. While Earth Observing (EO) satellites can play a significant role in this endeavor, no single satellite provides the combined spatial, spectral and temporal characteristics required for actionable ET monitoring world-wide. In this presentation we discuss new methods for combining information from the current suite of EO satellites to address issues of water quality, water use and water security, particularly as they pertain to agricultural production. These methods fuse multi-scale diagnostic ET retrievals generated using shortwave, thermal infrared and microwave datasets from multiple EO platforms to generate ET datacubes with both high spatial and temporal resolution. We highlight several case studies where such ET datacubes are being mined to investigate changes in water use patterns over agricultural landscapes in response to changing land use, land management, and climate forcings.

  16. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  17. Water security at local government level in South Africa: a qualitative interview-based analysis

    CSIR Research Space (South Africa)

    Meissner, Richard

    2018-05-01

    Full Text Available understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security....

  18. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  19. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    Obani, P.; Gupta, J.; Pahl-Wostl, C.; Badhuri, A.; Gupta, J.

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in

  20. Map of Water Infrastructure and Homes Without Access to Safe Drinking Water and Basic Sanitation on the Navajo Nation - October 2010

    Science.gov (United States)

    This document presents the results of completed work using existing geographic information system (GIS) data to map existing water and sewer infrastructure and homes without access to safe drinking water and basic sanitation on the Navajo Nation.

  1. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  2. Securitising Sustainability? Questioning the 'Water, Energy and Food-Security Nexus'

    Directory of Open Access Journals (Sweden)

    Matthias Leese

    2015-02-01

    Full Text Available The water, energy and food-security nexus approach put forward by the Bonn2011 Conference highlights the need for an integrative approach towards issues of water, energy and food, and puts them under a general framework of security. While acknowledging the need for urgent solutions in terms of sustainability, the nexus approach, at the same time, makes a normative claim to tackle the needs of the poorest parts of the world population. A closer look at the underlying rationales and proposed policy instruments, however, suggests that the primary scope of the conference proceedings is not a normative one, but one that reframes the conflict between distributional justice and the needs of the world economy under the paradigm of security. Reading this slightly shifted perspective through a Foucauldian lens, we propose that security is now put forward as the key mechanism to foster a new 'green' economy, and that the needs of the poorest are, if anything at all, a secondary effect of the proposed nexus approach.

  3. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  4. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  5. Operation of remote mobile sensors for security of drinking water distribution systems.

    Science.gov (United States)

    Perelman, By Lina; Ostfeld, Avi

    2013-09-01

    The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. 78 FR 28242 - Notice of Lodging of Proposed Consent Decree Under the Safe Drinking Water Act

    Science.gov (United States)

    2013-05-14

    ... Drinking Water Act (SDWA) and the Surface Water Treatment Rule, promulgated under the SDWA. Under the terms... public water system and to pay $8,000 into an escrow account to be used by the association for future... DEPARTMENT OF JUSTICE Notice of Lodging of Proposed Consent Decree Under the Safe Drinking Water...

  7. Safely Intake Number of Macridiscus sp. (Kerang Ceplos) from Tambak Lorok Waters, Semarang, Central Java, Indonesia

    Science.gov (United States)

    Meirenno Tielman, Eduard; Suprijanto, Jusup; Widowati, Ita

    2018-02-01

    The dynamics pollution that supposed to be derived from industrial activities around Tambak Lorok waters will affect the quality of waters, and also biota such as Macridiscus sp. mussels (Kerang Ceplos) that live and accumulate pollutants such as heavy metals (Pb, Cu, Al, Mn and Fe). However, Macridiscus sp. mussels which have been contaminated by heavy metals is usually sold for consumption by the people and if they consume it in excess, it will be toxic in the people’s body. So that, this study was to analyze Safely Intake Number of Macridiscus sp. from Tambak Lorok waters. This study used AAS (Atomic Absorption Spectrophotometry) method to analyze the accumulation number of the pollutant (Pb, Cu, Al, Mn and Fe). Safely Intake Number calculation is used MWI (Maximal Weekly Intake) and MTI (Maximal Tolerable Intake) calculation method. The results of AAS showed that the highest numbers of pollutant was Al (reached 534,51 mg/kg in the body of Macridiscus sp. that taken in February, 2016) and has exceeded the safely intake number (MWI Al = 1 mg/kg, based on WHO/FAO) so that it’s MTI values was low (0,08 kg/week/person). It means that Macridiscus sp. was not safe to be consumed excessively at that time.

  8. Challenges and Opportunities for Tribal Waters: Addressing Disparities in Safe Public Drinking Water on the Crow Reservation in Montana, USA.

    Science.gov (United States)

    Doyle, John T; Kindness, Larry; Realbird, James; Eggers, Margaret J; Camper, Anne K

    2018-03-21

    Disparities in access to safe public drinking water are increasingly being recognized as contributing to health disparities and environmental injustice for vulnerable communities in the United States. As the Co-Directors of the Apsaálooke Water and Wastewater Authority (AWWWA) for the Crow Tribe, with our academic partners, we present here the multiple and complex challenges we have addressed in improving and maintaining tribal water and wastewater infrastructure, including the identification of diverse funding sources for infrastructure construction, the need for many kinds of specialized expertise and long-term stability of project personnel, ratepayer difficulty in paying for services, an ongoing legacy of inadequate infrastructure planning, and lack of water quality research capacity. As a tribal entity, the AWWWA faces additional challenges, including the complex jurisdictional issues affecting all phases of our work, lack of authority to create water districts, and additional legal and regulatory gaps-especially with regards to environmental protection. Despite these obstacles, the AWWWA and Crow Tribe have successfully upgraded much of the local water and wastewater infrastructure. We find that ensuring safe public drinking water for tribal and other disadvantaged U.S. communities will require comprehensive, community-engaged approaches across a broad range of stakeholders to successfully address these complex legal, regulatory, policy, community capacity, and financial challenges.

  9. Water hydraulic manipulator for fail safe and fault tolerant remote handling operations at ITER

    International Nuclear Information System (INIS)

    Nieminen, Peetu; Esque, Salvador; Muhammad, Ali; Mattila, Jouni; Vaeyrynen, Jukka; Siuko, Mikko; Vilenius, Matti

    2009-01-01

    Department of Intelligent Hydraulics and Automation (IHA) of Tampere University of Technology has been involved in the European Fusion program since 1994 within the ITER reactor maintenance activities. In this paper we discuss the design and development of a six degrees of freedom water hydraulic manipulator with a force feedback for teleoperation tasks. The manipulator is planned to be delivered to Divertor Test Platform 2 (DTP2) during year 2008. The paper also discusses the possibility to improve the fail safe and redundant operation of the manipulator. During the design of the water hydraulic manipulator, special provisions have been made in order to meet the safety requirements such as servo valve block for redundant operation and safety vane brakes for fail safe operation.

  10. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  11. The role of commitment strength in enhancing safe water consumption: mediation analysis of a cluster-randomized trial.

    Science.gov (United States)

    Inauen, Jennifer; Tobias, Robert; Mosler, Hans-Joachim

    2014-11-01

    The objectives of this study were to investigate the importance of commitment strength in the theory of planned behaviour (TPB) and to test whether behaviour change techniques (BCTs) aimed at increasing commitment strength indeed promote switching to arsenic-safe wells by changing commitment strength. A cluster-randomized controlled trial with four arms was conducted to compare an information-only intervention to information plus one, two, or three commitment-enhancing BCTs. Randomly selected households (N = 340) of Monoharganj, Bangladesh, in seven geographically separate areas, whose members were drinking arsenic-contaminated water at baseline and had access to arsenic-safe wells, participated in this trial. The areas were randomly allocated to the four intervention arms. Water consumption behaviour, variables of the TPB, commitment strength, and socio-demographic characteristics were assessed at baseline and at 3-month follow-up by structured face-to-face interviews. Mediation analysis was used to investigate the mechanisms of behaviour change. Changes in commitment strength significantly increased the explanatory power of the TPB to predict well-switching. Commitment-enhancing BCTs - public self-commitment, implementation intentions, and reminders - increased the behaviour change effects of information by up to 50%. Mediation analyses confirmed that the BCTs indeed increased well-switching by increasing commitment strength. Unexpectedly, however, mediation via changes in behavioural intentions was the strongest mechanism of the intervention effects. Commitment is an important construct to consider in water- and health-related behaviour change and may be for other health behaviours as well. BCTs that alter behavioural intentions and commitment strength proved highly effective at enhancing the behaviour change effects of information alone. Statement of contribution What is already known on this subject? Millions of people drink contaminated water even if they

  12. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  13. Impact of the 1986 amendments to the Safe Drinking Water Act on the State of Mississippi. Technical completion report

    International Nuclear Information System (INIS)

    Sherrard, J.H.; Gibson, P.W.

    1991-10-01

    As a result of the U.S. Congress passing the 1986 Amendments to the Safe Drinking Water Act, the number of regulated contaminants that must be monitored in public water systems has increased from 24 to 85. The economic impact of the new legislation is greater on small systems than large systems because of economies of scale. In addition, more highly trained water treatment plant operators will be needed to deal with the complex legislation and to ensure the continuous supply of safe drinking water to their communities. Because of the complexity and increased scope of the 1986 Amendments to the Safe Drinking Water Act, a detailed discussion of the requirements that must be met by each public water supply is presented as background information. The objectives of the research were to: (1) determine the economic impacts of the 1986 Amendments on water systems throughout the State of Mississippi, (2) determine the number of systems that will need new and/or upgraded treatments technology to comply with the regulations, and (3) provide an assessment of the needs of the State DWS

  14. Agricultural Applications for Remotely Sensed Evapotranspiration Data in Monitoring Water Use, Water Quality, and Water Security

    Science.gov (United States)

    Anderson, M. C.; Hain, C.; Gao, F.; Yang, Y.; Sun, L.; Dulaney, W.; Sharifi, A.; Holmes, T. R.; Kustas, W. P.

    2016-12-01

    Across the U.S. and globally there are ever increasing and competing demands for freshwater resources in support of food production, ecosystems services and human/industrial consumption. Recent studies using the GRACE satellite have identified severely stressed aquifers globally, which are being unsustainably depleted due to over-extraction primarily in support of irrigated agriculture. In addition, historic droughts and ongoing political conflicts threaten food and water security in many parts of the world. To facilitate wise water management, and to develop sustainable agricultural systems that will feed the Earth's growing population into the future, there is a critical need for robust assessments of daily water use, or evapotranspiration (ET), over a wide range in spatial scales - from field to globe. While Earth Observing (EO) satellites can play a significant role in this endeavor, no single satellite provides the combined spatial, spectral and temporal characteristics required for actionable ET monitoring world-wide. In this presentation we discuss new methods for combining information from the current suite of EO satellites to address issues of water use, water quality and water security, particularly as they pertain to agricultural production. These methods fuse multi-scale diagnostic ET retrievals generated using shortwave, thermal infrared and microwave datasets from multiple EO platforms to generate ET datacubes with both high spatial and temporal resolution. We highlight several case studies where such ET datacubes are being mined to investigate changes in water use patterns over agricultural landscapes in response to changing land use, land management, and climate forcings.

  15. Growing water scarcity in agriculture: future challenge to global water security.

    Science.gov (United States)

    Falkenmark, Malin

    2013-11-13

    As water is an essential component of the planetary life support system, water deficiency constitutes an insecurity that has to be overcome in the process of socio-economic development. The paper analyses the origin and appearance of blue as well as green water scarcity on different scales and with particular focus on risks to food production and water supply for municipalities and industry. It analyses water scarcity originating from both climatic phenomena and water partitioning disturbances on different scales: crop field, country level and the global circulation system. The implications by 2050 of water scarcity in terms of potential country-level water deficits for food self-reliance are analysed, and the compensating dependence on trade in virtual water for almost half the world population is noted. Planetary-scale conditions for sustainability of the global water circulation system are discussed in terms of a recently proposed Planetary Freshwater Boundary, and the consumptive water use reserve left to be shared between water requirements for global food production, fuelwood production and carbon sequestration is discussed. Finally, the importance of a paradigm shift in the further conceptual development of water security is stressed, so that adequate attention is paid to water's fundamental role in both natural and socio-economic systems.

  16. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  17. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  18. Managed groundwater development for water-supply security in Sub ...

    African Journals Online (AJOL)

    security in Sub-Saharan Africa: Investment priorities ... 2010, together with a review of some developments in western Africa and insights from parts of Asia and Latin America. ...... and the Global Water Partnership (Ania Grobicki and Aurelie.

  19. Security of water, energy, and food nexus in the Asia-Pacific region

    Science.gov (United States)

    Taniguchi, M.; Endo, A.; Fujii, M.; Shoji, J.; Baba, K.; Gurdak, J. J.; Allen, D. M.; Siringan, F. P.; Delinom, R.

    2014-12-01

    Water, energy, and food are the most important and fundamental resources for human beings and society. Demands for these resources are escalating rapidly because of increases in populations and changes in lifestyles. Therefore intensive demand for those resources makes conflicts between resources. Securities of water, energy, and food are treated separately, however they should be considered as one integrated matter, because water-energy-food are connected and it makes nexus and tradeoff. Security in terms of self-production, diversity of alternatives, and variability are evaluated for water, energy and food for thirty two countries in the Asia-Pacific region. The water and energy nexus includes water consumption for the cooling of power plant systems, water use for hydro power generation, and energy consumption for water allocation and pumping. The water and food nexus consists of water consumption for agriculture and aquaculture. The energy and food nexus includes energy consumption for food production and biomass for energy. Analyses of 11 countries within the Asia- Pacific region show that energy consumption for fish is the largest among foods in Japan, Philippines, and Peru, while energy consumption for cereals is the largest among foods in Canada, US, Indonesia, and others. Water consumption for different types of food and energy are also analyzed, including nexus ratio to total water consumption. The water-energy-food nexus at a local level in the Asia Pacific region are examined by the Research Institute for Humanity and Nature project "Human environmental security in Asia Pacific Ring of Fire". Themes including geothermal power plants for energy development and hot springs as water, shale gas for energy development and water consumption/contamination, aquaculture for food and water contamination are used to evaluate the water-energy-food nexus in the Asia-Pacific region.

  20. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  1. FOOD SECURITY IN TUNISIA WITHIN WATER SCARCITY THE RELATIVE IMPORTANCE OF THE MEAT SECTOR

    Directory of Open Access Journals (Sweden)

    Emna Ouertani

    2016-01-01

    Full Text Available This paper analyzes the evolution of food and nutrition security in Tunisia, judges its sustainability within water scarcity conditions and free trade areas, with a specific focus on the meat sector. For such purpose, the FAO indicators and Food Balance Sheets, as well as the Global Food Security Index are all analyzed. Virtual water, owed to meat and cereals for animal feed production and trade, was estimated to expect food security sustainability. Results indicated that Tunisian food and nutrition security (FNS has been improved over the years, but its stability remains vulnerable because of the political and economic risks and the dependence of Tunisia on imported cereals for animal feed due to water scarcity. Tunisian agricultural policy, especially in both sectors of cereals and meat, should be readjusted to guarantee food and nutrition sustainability.

  2. What's Wrong with Bribery? An Example Utilizing Access to Safe Drinking Water

    Science.gov (United States)

    Dhooge, Lucien J.

    2013-01-01

    This case study examines the role of bribery in the global marketplace through an example involving access to safe drinking water in the developing world. Parts II and III set out the objectives and methods of classroom delivery for the case study. Part IV is the background reading relating to bribery with particular emphasis on the Foreign…

  3. Virtual Water and Food Security in Tunisia | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... on the world grain market has social implications for Tunisia's small farmers and ... Thus, when a country exports an agricultural product, in effect it also exports ... Tunisia that incorporates the virtual water concept in a food security strategy.

  4. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  5. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    Science.gov (United States)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  6. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  7. In the way of clean and safe drinking water : exploring limitations to improvement of the water supply in Bagamoyo District, Tanzania

    OpenAIRE

    Bemspång, Josefina; Segerström, Rebecka

    2009-01-01

    Bagamoyo District, in the Pwani region in Tanzania, supplies a large part of Tanzania'sbiggest city, Dar es Salaam, with water. At the same time many people in rural villages in thedistrict do not have access to clean and safe water. This thesis aims to explore what limitationsthere are to improvement of the rural water supply in Bagamoyo District. Specific attention ispaid to the organizational structure of the water sector and how roles and responsibilities aredivided, defined and communica...

  8. Access to Safe Water and Personal Hygiene Practices in the Kulandia Refugee Camp (Jerusalem).

    Science.gov (United States)

    Issa, Mohamad; McHenry, Michael; Issa, Abdul Aziz; Blackwood, R Alexander

    2015-12-22

    Diarrheal illness, frequently associated with fecal-oral transmission, is one of the leading causes of death worldwide. It is commonly preventable through the implementation of safe water practices. This experiment concerns how to best implement safe water practices in a quasi-permanent refugee camp setting with limited ability for structural changes. Specifically, we explore how health promotion activities that help identify target groups for hygiene interventions can play a role in disease prevention. An anonymous survey was conducted at the United Nations Relief and Works Agency Health Clinic in the Kulandia refugee camp to assess the safe water and personal hygiene practices. Demographic and social characteristics, accessible water and personal hygiene characteristics, and gastrointestinal (GI) burden for individuals and their households were assessed. A total of 96 individuals were enrolled; 62 females and 34 males. Approximately 58% of the sample had soap available and washed hands before and after eating and when preparing food. Piped water was the main source of drinking water (62%), while 31% of our sample utilized tanker-trucks. 93% of participants had access to toilet facilities, with 86% of these facilities being private households. 55% practice extra water hygiene measures on their household drinking water source. 51.3% considered vendor cleanliness when they were buying food. 51% had received formal health education. 68.8% had been taught by their parents, but only 55.2% were teaching their children and 15.6% had consistent access to a health professional for hygiene inquiries. Individual variables and hygiene practices associated with lower rates of diarrheal illnesses included having water piped into the home, proper hand washing, adequate soap availability, proper consideration of vendor cleanliness, higher income, levels of education, health hygiene education, and having access to healthcare professions to discuss hygiene related matters. This is

  9. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  10. Metallic iron for safe drinking water provision: Considering a lost knowledge.

    Science.gov (United States)

    Mwakabona, Hezron T; Ndé-Tchoupé, Arnaud Igor; Njau, Karoli N; Noubactep, Chicgoua; Wydra, Kerstin D

    2017-06-15

    Around year 1890, the technology of using metallic iron (Fe 0 ) for safe drinking water provision was already established in Europe. The science and technology to manufacture suitable Fe 0 materials were known and further developed in this period. Scientists had then developed skills to (i) explore the suitability of individual Fe 0 materials (e.g. iron filling, sponge iron) for selected applications, and (ii) establish treatment processes for households and water treatment plants. The recent (1990) discovery of Fe 0 as reactive agent for environmental remediation and water treatment has not yet considered this ancient knowledge. In the present work, some key aspects of the ancient knowledge are presented together with some contemporised interpretations, in an attempt to demonstrate the scientific truth contained therein. It appears that the ancient knowledge is an independent validation of the scientific concept that in water treatment (Fe 0 /H 2 O system) Fe 0 materials are generators of contaminant collectors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Water security and societal impacts of tropical cyclones in northwestern Mexico, 1970-2010

    Science.gov (United States)

    Scott, C. A.; Farfan, L.

    2012-12-01

    Hydroclimatic variability is one of several potential threats to water security, defined as sustainable quantities and qualities of water for resilient societies and ecosystems in the face of uncertain global environmental change. Other threats can stem from human dimensions of global change, e.g., long-distance trade of water-intensive agricultural commodities or pollution resulting from industrial production and mining in response to rising global market demand. Drought and water scarcity are considered the principal, chronic, hydroclimatic drivers of water insecurity in arid and semi-arid regions. In these conditions, however, rainfall is both the water-supply lifeline and, in extreme events, the cause of flood hazard. In this study, we consider the monsoon-dominated Pacific coast of Mexico and assess the human impacts from tropical cyclone landfall over the past four decades (1970-2010). Storm data from the U.S. National Hurricane Center, rainfall reports from Mexico's National Meteorological Service, and indicators from an international disaster database at Belgium's Université Catholique de Louvain are used to assess the impacts of more than 30 landfall events. For the ten events with the greatest population impact, between 20,000 to 800,000 people were affected by each landfalling cyclone. Strong winds and heavy rainfall, particularly when sustained over periods of 1-3 days, result in significant property damage and loss of life. Results indicate that, in densely populated areas, excessive rainfall accumulations and high daily rates are important causes of cyclone disasters. Strengthening water security associated with extreme events requires planning via structured exchanges between scientists and decision-makers. Adaptive management that accounts for uncertainties, initiates responses, and iteratively assesses outcomes is the thrust of an emerging water-security initiative for the arid Americas that seeks to strengthen water security in northwestern

  12. Safe and High Quality Food Production using Low Quality Waters and Improved Irrigation Systems and Management, EU Project

    DEFF Research Database (Denmark)

    Plauborg, Finn; Jensen, Christian Richardt; Dalsgaard, Anders

    2009-01-01

    : the safety and quality of food products, and the increasing competition for clean freshwater. SAFIR is funded for the period 2005-2009 under the Food Quality and Safety thematic area of the EU 6th Framework Research Programme. The challenge for the next years will be to produce safe and high quality foods...... a multi-disciplinary team, with food safety and quality experts, engineers, agronomists and economists from17 research institutes and private companies in Europe, Israel and China working together. The project assesses potential risks to farmers. Coupled with farm management and economic models, a new...... intelligent tool for efficient and safe use and re-use of low-quality water are being developed. Already published results indicate water saving in the order of 25-30% in agricultural crops as potatoes and tomatoes are possible without yield reduction. Slightly treated waste water can be used safely when...

  13. Irrigation water as a source of drinking water: is safe use possible?

    Science.gov (United States)

    van der Hoek, W; Konradsen, F; Ensink, J H; Mudasser, M; Jensen, P K

    2001-01-01

    .69-0.93). This indicates that good quality drinking water provides additional health benefits only when sufficient quantities of water and a toilet are available. In a multivariate analysis no association was found between water quality and diarrhoea but there was a significant effect of water quantity on diarrhoea which was to a large extent mediated through sanitation and hygiene behaviour. Increasing the availability of water in the house by having a household connection and a storage facility is the most important factor associated with reduced diarrhoea in this area. Safe use of canal irrigation water seems possible if households can pump seepage water to a large storage tank in their house and have a continuous water supply for sanitation and hygiene. Irrigation water management clearly has an impact on health and bridging the gap between the irrigation and drinking water supply sectors could provide important health benefits by taking into account the domestic water availability when managing irrigation water.

  14. Food and Livelihood Security in Punjab through Water, Energy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Food and Livelihood Security in Punjab through Water, Energy and Agricultural Management ... management and facilitating access to resources by low-income farmers. ... Sharing opportunities for innovation in climate change adaptation.

  15. A Hydrological Concept including Lateral Water Flow Compatible with the Biogeochemical Model ForSAFE

    Directory of Open Access Journals (Sweden)

    Giuliana Zanchi

    2016-03-01

    Full Text Available The study presents a hydrology concept developed to include lateral water flow in the biogeochemical model ForSAFE. The hydrology concept was evaluated against data collected at Svartberget in the Vindeln Research Forest in Northern Sweden. The results show that the new concept allows simulation of a saturated and an unsaturated zone in the soil as well as water flow that reaches the stream comparable to measurements. The most relevant differences compared to streamflow measurements are that the model simulates a higher base flow in winter and lower flow peaks after snowmelt. These differences are mainly caused by the assumptions made to regulate the percolation at the bottom of the simulated soil columns. The capability for simulating lateral flows and a saturated zone in ForSAFE can greatly improve the simulation of chemical exchange in the soil and export of elements from the soil to watercourses. Such a model can help improve the understanding of how environmental changes in the forest landscape will influence chemical loads to surface waters.

  16. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  17. Water Security at Local Government Level: What do People Think?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-06-01

    Full Text Available stream_source_info Meissner_2016.pdf.txt stream_content_type text/plain stream_size 2853 Content-Encoding UTF-8 stream_name Meissner_2016.pdf.txt Content-Type text/plain; charset=UTF-8 Water Security at Local... Government Level: What do People Think? By Dr. Richard Meissner Integrated Water Assessment Group Natural Resources and the Environment Council for Scientific and Industrial Research Presented at the Sustainable Water Seminar 2016, CSIR ICC, 2...

  18. Water security and the science agenda

    Science.gov (United States)

    Wheater, Howard S.; Gober, Patricia

    2015-07-01

    The freshwater environment is facing unprecedented global pressures. Unsustainable use of surface and groundwater is ubiquitous. Gross pollution is seen in developing economies, nutrient pollution is a global threat to aquatic ecosystems, and flood damage is increasing. Droughts have severe local consequences, but effects on food can be global. These current pressures are set in the context of rapid environmental change and socio-economic development, population growth, and weak and fragmented governance. We ask what should be the role of the water science community in addressing water security challenges. Deeper understanding of aquatic and terrestrial environments and their interactions with the climate system is needed, along with trans-disciplinary analysis of vulnerabilities to environmental and societal change. The human dimension must be fully integrated into water science research and viewed as an endogenous component of water system dynamics. Land and water management are inextricably linked, and thus more cross-sector coordination of research and policy is imperative. To solve real-world problems, the products of science must emerge from an iterative, collaborative, two-way exchange with management and policy communities. Science must produce knowledge that is deemed to be credible, legitimate, and salient by relevant stakeholders, and the social process of linking science to policy is thus vital to efforts to solve water problems. The paper shows how a large-scale catchment-based observatory can be used to practice trans-disciplinary science integration and address the Anthropocene's water problems.

  19. Water security at local government level: what do people think it means in eThekwini? Ntshongweni Community feedback

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available defined by international organisations or scientists, like UN Water. • Water security is NOT about quantity, quality, availability, reliable supply, water borne diseases… • Water security is about individuals, and their environment—lived experience...

  20. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  1. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  2. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  3. Water and Sanitation Standards in Humanitarian Action

    Directory of Open Access Journals (Sweden)

    Murat ERSEL

    2015-10-01

    Full Text Available SUMMARY: The right to water and sanitation is an inextricable human right. Water and sanitation are critical determinants for survival in the initial stages of a disaster. An adequate amount of safe water is necessary to prevent death from dehydration, to reduce the risk of water-related disease and to provide for consumption, cooking and personal and domestic hygienic requirements. The main objective of WASH – (Water supply, Sanitation and Hygenie promotion programmes in disasters is to reduce the transmission of faeco-oral diseases and exposure to disease-bearing vectors through the promotion of: good hygiene practices, the provision of safe drinking water, the reduction of environmental health risks, the conditions that allow people to a healthy life with dignity, comfort and security. Keywords: Water, sanitation, disasters, humanitarian response, hygenie promotion, drainage, vector control, waste disposition

  4. Staying Safe on the Water

    Centers for Disease Control (CDC) Podcasts

    2008-06-05

    In this podcast for all audiences, Dr. Julie Gilchrist from CDC's Injury Center outlines tips for safe boating.  Created: 6/5/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 6/8/2008.

  5. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    Science.gov (United States)

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  6. Water chemistry technology. One of the key technologies for safe and reliable nuclear power plant operation

    International Nuclear Information System (INIS)

    Uchida, Shunsuke; Katsumura, Yosuke

    2013-01-01

    Water chemistry control is one of the key technologies to establish safe and reliable operation of nuclear power plants. Continuous and collaborative efforts of plant manufacturers and plant operator utilities have been focused on optimal water chemistry control, for which, a trio of requirements for water chemistry should be simultaneously satisfied: (1) better reliability of reactor structures and fuel rods; (2) lower occupational exposure and (3) fewer radwaste sources. Various groups in academia have carried out basic research to support the technical bases of water chemistry in plants. The Research Committee on Water Chemistry of the Atomic Energy Society of Japan (AESJ), which has now been reorganized as the Division of Water Chemistry (DWC) of AESJ, has played important roles to promote improvements in water chemistry control, to share knowledge about and experiences with water chemistry control among plant operators and manufacturers and to establish common technological bases for plant water chemistry and then to transfer them to the next generation of plant workers engaged in water chemistry. Furthermore, the DWC has tried and succeeded arranging R and D proposals for further improvement in water chemistry control through roadmap planning. In the paper, major achievements in plant technologies and in basic research studies of water chemistry in Japan are reviewed. The contributions of the DWC to the long-term safe management of the damaged reactors at the Fukushima Daiichi Nuclear Power Plant until their decommissioning are introduced. (author)

  7. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  8. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  9. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  10. Water Security in Times of Climate Change and Intractability: Reconciling Conflict by Transforming Security Concerns into Equity Concerns

    Directory of Open Access Journals (Sweden)

    Neil Powell

    2017-12-01

    Full Text Available This paper considers how to achieve equitable water governance and the flow-on effects it has in terms of supporting sustainable development, drawing on case studies from the international climate change adaptation and governance project (CADWAGO. Water governance, like many other global issues, is becoming increasingly intractable (wicked with climate change and is, by the international community, being linked to instances of threats to human security, the war in the Sudanese Darfur and more recently the acts of terrorism perpetuated by ISIS. In this paper, we ask the question: how can situations characterized by water controversy (exacerbated by the uncertainties posed by climate change be reconciled? The main argument is based on a critique of the way the water security discourse appropriates expert (normal claims about human-biophysical relationships. When water challenges become increasingly securitized by the climate change discourse it becomes permissible to enact processes that legitimately transgress normative positions through post-normal actions. In contrast, the water equity discourse offers an alternative reading of wicked and post-normal water governance situations. We contend that by infusing norm critical considerations into the process of securitization, new sub-national constellations of agents will be empowered to enact changes; thereby bypassing vicious cycles of power brokering that characterize contemporary processes intended to address controversies.

  11. Water resources for urban water and food security: the case of megacity Hong Kong

    Science.gov (United States)

    Vanham, Davy; Gawlik, Bernd; Bidoglio, Giovanni

    2017-04-01

    The extent to which urban dwellers consume resources is key on the path to reaching global SDGs. One of these resources is water, which is consumed in a direct and indirect way by city inhabitants, to achieve water and food security within city borders. In this study, we quantify the water resources required to provide these two essential securities for megacity Hong Kong. During the last years, this city has made large investments to make its urban water supply system more water efficient and sustainable. As such, its municipal water abstraction - often defined as direct water use - has decreased from 355 litres per capita per day (l/cap/d) in 2005 to 326 l/cap/d in 2013. Due to its political history, Hong Kong is unique in the world in data availability on urban food consumption. It is therefore the ideal case study to show typical urban food consumption behaviour and its related indirect water use. The current average diet in Hong Kong is very different to the average Chinese diet. It is characterised by a high intake of water intensive products like animal products and sugar, leading to a food related indirect water use or water footprint (WFcons) of 4727 l/cap/d. According to recommendations from the Chinese Nutrition Society for a healthy diet, the intake of some product groups should be increased (vegetables and fruit) and of other product groups reduced (sugar, crop oils, meat and animal fats). This would result in a reduction of the WFcons of 40% to 2852 l/cap/d. Especially the reduced intake of meat (including offals) from currently 126 kg per capita per year (kg/cap/yr) to the recommended value 27 kg/cap/yr would result in a substantial WFcons reduction. Meat consumption in Hong Kong is extremely high. A pesco-vegetarian diet would result in a reduction of 49% (to 2398 l/cap/d) and a vegetarian diet in a 53% (to 2224 l/cap/d) reduction. Hong Kong citizens can thus save a lot of water by looking at their indirect water use, through a change in their diet

  12. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  13. Water Security in Periurban South Asia : Adapting to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Chargé(e) de projet. Prof. Ashutosh Kumar Shukla. Institution. Nepal Engineering College. Pays d' institution. Nepal. Site internet. http://www.nec.edu.np. Extrants. Études. Communication strategy in action research on water security in four South Asian peri-urban locations : CCW Asia Regional Partners Meeting, June ...

  14. Validation of radioactivity measurements under the Safe Drinking Water Act

    International Nuclear Information System (INIS)

    Goldin, Abraham S.

    1978-01-01

    Radioactivity measurements are made under the Safe Drinking Water Act to obtain information on the potential radiological hazard of water and to institute regulatory action when water quality does not meet requirements. Measurements must be both precise and accurate if these goals are to be met. Regulations issued under the act require that analyses be performed by approved (certified) laboratories, which must carry out quality assurance programs. This paper briefly describes the certification requirements and discusses the components of an effective quality assurance program. The Environmental Protection Agency has established procedures for the certification of laboratories making radioactivity measurements of drinking water. These procedures recommend minimum laboratory qualifications for personnel, facilities, equipment, and procedures; proficiency testing by analysis of samples provided by the Agency; and operation of a quality assurance program. A major function of a quality assurance program is to provide the Laboratory Director an ongoing flow of information on laboratory analytical performance. A properly designed and conducted program provides this information in a timely manner, indicates areas where discrepancies exist, and often suggests ways of correcting the discrepancies. Pertinent aspects of radioactivity measurements for drinking water are discussed, including how analyses of blanks, blind duplicates, and reference samples contribute needed information, and evaluations by control charts and statistical analyses. Examples of the usefulness of quality control in correcting both procedural and background problems are given. (author)

  15. The struggle for safe nuclear expansion in China

    International Nuclear Information System (INIS)

    Xu, Y.C.

    2014-01-01

    After a temporary halt following the Fukushima nuclear disaster in March 2011, China resumed its fast, yet cautious, expansion of nuclear energy programme. Nuclear energy is considered as part of the general strategy to deal with the challenges of energy security and climate change and to advance with ‘state of the art’ technology in its development. This article briefly discusses recent development in and driving forces behind nuclear industry in China, and several challenges it has been facing: how to adopt, adapt, standardise and indigenise whose technologies, and how to address the shortage of qualified nuclear engineers, scientists, skilled labour force and qualified regulators. More importantly, it argues that safe and secure nuclear development requires consistent policies and effective regulations. Therefore, it is crucial to build policy and regulatory capacities based on coordination, planning and management of government agencies and the industry. - Highlights: • Nuclear energy development in China. • Nuclear technology selection. • Human capital. • Regulatory regime. • Safe and secure development

  16. Water Security in Periurban South Asia : Adapting to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Adapting to climate change and water security in Asia : proceedings from the Regional Meeting for IDRC-funded partners in Asia working on climate change ... L'honorable Chrystia Freeland, ministre du Commerce international, a annoncé le lancement d'un nouveau projet financé par le Centre de recherches pour le ...

  17. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  18. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  19. Does improved access to water supply by rural households enhance the concept of safe water at the point of use? A case study from deep rural South Africa.

    Science.gov (United States)

    Jagals, P

    2006-01-01

    The concept of safe water is defined by three principles: the health-related quality must be suitable, the supply/source must be accessible and the water must constantly be available in quantities sufficient for the intended use. If any one (or more) of these three elements is missing from a water services improvement programme, providing safe water is not successfully achieved. A study in a deep rural area in South Africa showed that providing small communities, using untreated river water as their only water source, with good quality water through a piped distribution system and accessible at communal taps did not fall within our parameters of safe water. The parameters for measuring the three principles were: absence of Escherichia coli in drinking water samples; accessibility by improving tap distances to within 200 m from each household; availability by assessing whether households have at least 25 L per person per day. Results show that although E. coli levels were reduced significantly, households were still consuming water with E. coli numbers at non-compliant levels. Access (distance) was improved from an average of 750 m from households to river source to an average of 120 m to new on-tap source points. This did not result in significant increases in household quantities, which on average remained around 18 L per person per day.

  20. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  1. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  2. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  3. Land security and the challenges of realizing the human right to water and sanitation in the slums of Mumbai, India.

    Science.gov (United States)

    Murthy, Sharmila L

    2012-12-15

    Addressing the human right to water and sanitation in the slums of Mumbai, India requires disentangling the provision of basic services from a more complicated set of questions around land security and land ownership. Millions of slum-dwellers in Mumbai lack adequate access to safe drinking water and sanitation, which places them at risk for waterborne diseases. Many slums are located in hazardous areas such as flood plains, increasing their susceptibility to climate change-related weather patterns. Access to water and sanitation in slums generally hinges on whether a dwelling was created prior to January 1, 1995, because those constructed created prior to that date have greater land security. Although the so-called "1995 cut-off rule" looms large in Mumbai slum policy, a closer reading of the relevant laws and regulations suggests that access to water and sanitation could be expanded to slums created after January 1, 1995. State and municipal governments already have the authority to expand access to water services; they just need to exercise their discretion. However, slums located on central government land are in a more difficult position. Central government agencies in Mumbai have often refused to allow the state and municipal governments to rehabilitate or improve access to services for slums located on their land. As a result, an argument could be made that by interfering with the efforts of sub-national actors to extend water and sanitation to services to slum-dwellers, the central government of India is violating its obligations to respect the human right to water and sanitation under international and national jurisprudence. Copyright © 2012 Murthy. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are

  4. Organising a safe space for navigating social-ecological transformations to sustainability.

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-05-28

    The need for developing socially just living conditions for the world's growing population whilst keeping human societies within a 'safe operating space' has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a 'safe space' to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  5. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2013-0934] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION..., Oahu, HI. (a) Location. The following area, within the COTP Honolulu Zone (see 33 CFR 3.70-10), from...

  6. Android: Analysis of its architecture and security mechanism

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on? This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.

  7. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  8. Women's rights and access to water and sanitation in Delhi | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2012-04-24

    Apr 24, 2012 ... ... chores keeps women from earning wages or girls from going to school. ... The challenge is to motivate local governments to provide safe water and ... and filthy with excrement, and lacking both privacy and proper security.

  9. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-1111] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., Oahu, HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3...

  10. 76 FR 80251 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-12-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1142] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3.70...

  11. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  12. Indicators of food and water security in an Arctic Health context--results from an international workshop discussion.

    Science.gov (United States)

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  13. The Replacement of Safe Assets: Evidence from the U.S. Bond Portfolio

    OpenAIRE

    Bertaut, Carol C.; Tabova, Alexandra M.; Wong, Vivian

    2014-01-01

    The expansion in financial sector "safe" assets, largely in the form of structured products from the U.S. and the Caribbean, in the lead-up to the global financial crisis has by now been fairly well documented. Using a unique dataset derived from security-level data on U.S. portfolio holdings of foreign securities, we show that since the crisis, it is mostly the foreign financial sector that appears to have met U.S. demand for safe and liquid investment assets by expanding its supply of debt ...

  14. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  15. Sacroiliac secure corridor: analysis for safe insertion of iliosacral screws

    Directory of Open Access Journals (Sweden)

    Henrique Alves Cruz

    2013-08-01

    Full Text Available OBJECTIVE: Posterior pelvic lesions, especially of the sacral-iliac joint, have high mortality and morbidity risks. Definitive fixation is necessary for the joint stabilization, and one option is the sacral percutaneous pinning with screws. Proximity to important structures to this region brings risks to the fixation procedure; therefore, it is important to know the tridimensional anatomy of the pelvis posterior region. Deviations of the surgeon's hand of four degrees may target the screws to those structures; dimorphisms of the upper sacrum and a poor lesion reduction may redound in a screw malpositioning. This study is aimed to evaluate the dimensions of a safe surgical corridor for safe sacroiliac screw insertion and relations with age and sex of the patients. METHOD: One hundred randomly selected pelvis CTs of patients with no pelvic diseases, seen at a tertiary care teaching Hospital. Measurements were made by computer and the safest area for screw insertion was calculated by two methods. The results were expressed in mm (not in degrees, in order to be a further surgical reference. RESULTS: There was a significant size difference in the analyzed sacral vertebra, differing on a wider size in men than in women. There was no significant statistical difference between vertebral size and age. By both methods, a safe area for screw insertion could be defined. CONCLUSION: Age does not influence the width of the surgical corridor. The surgeon has a safe corridor considered narrower when inserting screws in a female pelvis than when in a male one. However, as the smallest vertebra found (feminine was considered for statics, it was concluded that this corridor is 20 mm wide in any direction, taking as a reference the centrum of the vertebra.

  16. Concept of safe tank-type water cooled and moderated reactor with HTGR microparticle fuel compacts

    International Nuclear Information System (INIS)

    Gol'tsev, A.O.; Kukharkin, N.E.; Mosevitskij, I.S.; Ponomarev-Stepnoj, N.N.; Popov, S.V.; Udyanskij, Yu.N.; Tsibul'skij, V.F.

    1993-01-01

    Concept of safe tank-type water-cooled and moderated reactor on the basis of HTGR fuel microparticles which enable to avoid environment contamination with radioactive products under severe accidents, is proposed. Results of neutron-physical and thermal-physical studies of water cooled and moderated reactor with HTGR microparticle compacts are presented. Characteristics of two reactors with thermal power of 500 and 1500 MW are indicated within the concept frames. The reactor behaviour under severe accident connected with complete loss of water coolant is considered. It is shown that under such an accident the fission products release from fuel microparticles does not occur

  17. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  18. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  19. HACCP (Hazard Analysis and Critical Control Points) to guarantee safe water reuse and drinking water production--a case study.

    Science.gov (United States)

    Dewettinck, T; Van Houtte, E; Geenens, D; Van Hege, K; Verstraete, W

    2001-01-01

    To obtain a sustainable water catchment in the dune area of the Flemish west coast, the integration of treated domestic wastewater in the existing potable water production process is planned. The hygienic hazards associated with the introduction of treated domestic wastewater into the water cycle are well recognised. Therefore, the concept of HACCP (Hazard Analysis and Critical Control Points) was used to guarantee hygienically safe drinking water production. Taking into account the literature data on the removal efficiencies of the proposed advanced treatment steps with regard to enteric viruses and protozoa and after setting high quality limits based on the recent progress in quantitative risk assessment, the critical control points (CCPs) and points of attention (POAs) were identified. Based on the HACCP analysis a specific monitoring strategy was developed which focused on the control of these CCPs and POAs.

  20. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  1. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  2. Surveillance and Maintenance Plan for the 105-C Reactor Safe Storage Enclosure

    International Nuclear Information System (INIS)

    Logan, T. E.

    1998-01-01

    This document provides a plan for implementing surveillance and maintenance activities to ensure that the 105-C Reactor Safe Storage Enclosure is maintained in a safe, environmentally secure, and cost-effective manner until subsequent closure during the final disposition phase of decommissioning

  3. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  4. Do low-cost ceramic water filters improve water security in rural South Africa?

    Science.gov (United States)

    Lange, Jens; Materne, Tineke; Grüner, Jörg

    2016-10-01

    This study examined the performance of a low-cost ceramic candle filter system (CCFS) for point of use (POU) drinking water treatment in the village of Hobeni, Eastern Cape Province, South Africa. CCFSs were distributed in Hobeni and a survey was carried out among their users. The performance of 51 CCFSs was evaluated by dip slides and related to human factors. Already after two-thirds of their specified lifetime, none of the distributed CCFSs produced water without distinct contamination, and more than one-third even deteriorated in hygienic water quality. Besides the water source (springs were preferable compared to river or rain water), a high water throughput was the dominant reason for poor CCFS performance. A stepwise laboratory test documented the negative effects of repeated loading and ambient field temperatures. These findings suggest that not every CCFS type per se guarantees improved drinking water security and that the efficiency of low-cost systems should continuously be monitored. For this purpose, dip slides were found to be a cost-efficient alternative to standard laboratory tests. They consistently underestimated microbial counts but can be used by laypersons and hence by the users themselves to assess critical contamination of their filter systems.

  5. Water sovereignty and security, high politics and hard power: the dangers of borrowing discourses!

    NARCIS (Netherlands)

    Gupta, J.; Dellapenna, J.W.; van den Heuvel, M.; Pahl-Wostl, C.; Bhaduri, A.; Gupta, J.

    2016-01-01

    This chapter argues that water security has many meanings. It addresses the question: will framing water in terms of ‘water security’ be likely to do a disservice to the water governance challenge of the 21st century? Isn’t there a real risk that the term will become hostage to a much more sinister

  6. Water security and its challenges for Malaysia

    Science.gov (United States)

    Malek, M. A.; Nor, M. A. M.; P, Leong Y.

    2013-06-01

    Water Security in Malaysia is a national issue. The Malaysian water services industry faces issues which need to be tackled immediately for it to be viable and sustainable. Among them are the decentralized water services sector, ineffective governance structure, unsustainable tariffs, huge investments required to develop the water supply and sewerage infrastructure, inefficient operation by the operators and high non-revenue water (NRW) losses. In Malaysia, the "Sectorial" approach embedded in the present water management system and its transformation towards "Integrated Water Resources Management" (IWRM), is still in a state of inertia. This paper presents the need to transform, from a "Supply" Management mode (a characteristic of a developing country) to a "Water Demand" Management mode (a characteristic of a developed country). Issues on "Water Demand" Management for the Environment which can be a threat to the need for sustainable development for biodiversity are highlighted here. Reliable water accounting systems are found still lacking in this country, especially in the Agriculture and Environmental Sectors, where figures are still highly based on "traditional" assumptions. Water Quality deterioration remains an issue especially for the Water Supply and Environment Sectors. Available surface water resource is depleting in many regions and states in the Peninsular. Apart from the Reduce, Reuse and Recycle (3R) option for surface water, another option would be to begin a concerted effort for groundwater exploitation. However there are still grey areas of knowledge in the groundwater resources in this country for affirmative decisions and development of appropriate policies. It is also found that, there are no concerted plans to prepare the public for the change from "Supply" Management to "Demand" Management. In a developed nation, this change is through stakeholder platforms and supported by appropriate policies, rules and regulations that are based on

  7. Water security and its challenges for Malaysia

    International Nuclear Information System (INIS)

    Malek, M A; Leong Y P; Nor, M A M

    2013-01-01

    Water Security in Malaysia is a national issue. The Malaysian water services industry faces issues which need to be tackled immediately for it to be viable and sustainable. Among them are the decentralized water services sector, ineffective governance structure, unsustainable tariffs, huge investments required to develop the water supply and sewerage infrastructure, inefficient operation by the operators and high non-revenue water (NRW) losses. In Malaysia, the 'Sectorial' approach embedded in the present water management system and its transformation towards 'Integrated Water Resources Management' (IWRM), is still in a state of inertia. This paper presents the need to transform, from a 'Supply' Management mode (a characteristic of a developing country) to a 'Water Demand' Management mode (a characteristic of a developed country). Issues on 'Water Demand' Management for the Environment which can be a threat to the need for sustainable development for biodiversity are highlighted here. Reliable water accounting systems are found still lacking in this country, especially in the Agriculture and Environmental Sectors, where figures are still highly based on 'traditional' assumptions. Water Quality deterioration remains an issue especially for the Water Supply and Environment Sectors. Available surface water resource is depleting in many regions and states in the Peninsular. Apart from the Reduce, Reuse and Recycle (3R) option for surface water, another option would be to begin a concerted effort for groundwater exploitation. However there are still grey areas of knowledge in the groundwater resources in this country for affirmative decisions and development of appropriate policies. It is also found that, there are no concerted plans to prepare the public for the change from 'Supply' Management to 'Demand' Management. In a developed nation, this change is through stakeholder platforms and supported by appropriate policies, rules and regulations that are based on

  8. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  9. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  10. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  11. Water chemistry - one of the key technologies for safe and reliable nuclear power plant operation

    International Nuclear Information System (INIS)

    Uchida, S.; Otoha, K.; Ishigure, K.

    2006-01-01

    Full text: Full text: Water chemistry control is one of the key technologies to establish safe and reliable operation of nuclear power plants. Continuous and collaborative efforts of plant manufacturers and plant operator utilities have been focused on optimal water chemistry control, for which, a trio of requirements for water chemistry, a) better reliability of reactor structures and fuels, b) lower occupational exposure, and c) fewer radwaste sources, should be simultaneously satisfied. The research committee related to water chemistry of the Atomic Energy Society of Japan has played important roles to enhance improvement in water chemistry control, to share knowledge and experience with water chemistry among plant operators and manufacturers, to establish common technological bases for plant water chemistry and then to transfer them to the next generation related to water chemistry. Furthermore, the committee has tried to contribute to arranging R and D proposals for further improvement in water chemistry control through road map planning

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. Measuring User Compliance and Cost Effectiveness of Safe Drinking Water Programs: A Cluster-Randomized Study of Household Ultraviolet Disinfection in Rural Mexico.

    Science.gov (United States)

    Reygadas, Fermín; Gruber, Joshua S; Dreizler, Lindsay; Nelson, Kara L; Ray, Isha

    2018-03-01

    Low adoption and compliance levels for household water treatment and safe storage (HWTS) technologies have made it challenging for these systems to achieve measurable health benefits in the developing world. User compliance remains an inconsistently defined and poorly understood feature of HWTS programs. In this article, we develop a comprehensive approach to understanding HWTS compliance. First, our Safe Drinking Water Compliance Framework disaggregates and measures the components of compliance from initial adoption of the HWTS to exclusive consumption of treated water. We apply this framework to an ultraviolet (UV)-based safe water system in a cluster-randomized controlled trial in rural Mexico. Second, we evaluate a no-frills (or "Basic") variant of the program as well as an improved (or "Enhanced") variant, to test if subtle changes in the user interface of HWTS programs could improve compliance. Finally, we perform a full-cost analysis of both variants to assess their cost effectiveness (CE) in achieving compliance. We define "compliance" strictly as the habit of consuming safe water. We find that compliance was significantly higher in the groups where the UV program variants were rolled out than in the control groups. The Enhanced variant performed better immediately postintervention than the Basic, but compliance (and thus CE) degraded with time such that no effective difference remained between the two versions of the program.

  14. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    Directory of Open Access Journals (Sweden)

    Lena Maria Nilsson

    2013-08-01

    Full Text Available In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  15. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Science.gov (United States)

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  16. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Directory of Open Access Journals (Sweden)

    Laura Pereira

    2015-05-01

    Full Text Available The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access, economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  17. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-01-01

    The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation. PMID:26030471

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  20. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  1. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  2. EUROSAFE forum 2013. Safe disposal of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The proceedings of the EUROSAFE forum 2013 - safe disposal of nuclear waste include contributions to the following topics: Nuclear installation safety - assessment; nuclear installation safety - research; waste and decommissioning - dismantling; radiation protection, 3nvironment and emergency preparedness; security of nuclear installations and materials.

  3. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  4. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  5. Sustainability of arsenic mitigation interventions – an evaluation of different alternative safe drinking water options provided in Matlab, an arsenic hot spot in Bangladesh

    Directory of Open Access Journals (Sweden)

    MOHAMMED eHOSSAIN

    2015-05-01

    Full Text Available The wide spread occurrence of geogenic arsenic (As in Bangladesh groundwater drastically reduced the safe water access across the country. Since its discovery in 1993, different mitigation options tested at household and community scale have resulted in limited success. In an arsenic hotspot of southeastern Bangladesh, 841 arsenic removal filter (ARF, 190 surface water filter membrane, 23 pond sand filter (PSF, 147 rain water harvester (RWH and 59 As-safe tubewell were distributed among the severely exposed population by AsMat, a Sida supported project. After three-four years of providing these safe water options, this study was carried out during 2010-2011 for performance analysis of these options, in terms of technical viability and effectiveness and thus to evaluate the preference of different options to the end users. Household and community based surveys were done to make an assessment of the current water use pattern as impact of the distributed options, overall condition of the options provided and to identify the reasons why these options are in use and/or abandoned. In total, 284 households were surveyed and information was collected for 23 PSF, 147 RWH and 59 tubewells. None of the filters was found in use. Among other options distributed, 13% of PSF, 40% RWH and 93% of tubewell were found functioning. In all cases, tubewells were found As-safe. About 89% of households are currently using tubewell water which was 58% before. Filter was abandoned for high cost and complicated maintenance. The use of RWH and PSF was not found user friendly and ensuring year round water quality is a big challenge. Arsenic-safe tubewell was found as a widely accepted option mainly because of its easy operation and availability of water, good water quality and negligible maintenance. This study validated tubewell as the most feasible option and holds significance for planning water supply projects, improving mitigation policy as well as developing awareness

  6. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  7. Integral Inherently Safe Light Water Reactor (I2S-LWR)

    International Nuclear Information System (INIS)

    Petrovic, Bojan; Memmott, Matthew; Boy, Guy; Charit, Indrajit; Manera, Annalisa; Downar, Thomas; Lee, John; Muldrow, Lycurgus; Upadhyaya, Belle; Hines, Wesley; Haghighat, Alierza

    2017-01-01

    This final report summarizes results of the multi-year effort performed during the period 2/2013- 12/2016 under the DOE NEUP IRP Project ''Integral Inherently Safe Light Water Reactors (I 2 S-LWR)''. The goal of the project was to develop a concept of a 1 GWe PWR with integral configuration and inherent safety features, at the same time accounting for lessons learned from the Fukushima accident, and keeping in mind the economic viability of the new concept. Essentially (see Figure 1-1) the project aimed to implement attractive safety features, typically found only in SMRs, to a larger power (1 GWe) reactor, to address the preference of some utilities in the US power market for unit power level on the order of 1 GWe.

  8. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  9. The Socio-hydrology of Bangalore's Lake System and implications for Urban Water Security

    Science.gov (United States)

    Srinivasan, V.; Roy, S.

    2017-12-01

    Bengaluru city has experienced unprecedented growth in recent decades. If the city is to sustain growth and claim its position as a "global" high-tech city, it must be able to secure sufficient water supply and also create a healthy livable environment. With the city's many lakes vanishing due to rapid urbanisation, depletion of groundwater as a result of overuse in the peri-urban areas, and lack of proper underground drainage system and sewage treatment plants, Bangalore is now grappling with issues of imminent water crisis, inequitable access to water supply, and public health hazards. In this context, the restoration of Bangalore's lakes has been promoted as a panacea for its flooding, water stress, and wastewater problems. It has been argued that lakes can store storm water and recycled wastewater and avoid the need for potentially destructive, expensive schemes that may destroy biodiversity rich aquatic ecosystems and forests. Bangalore's lakes are linked by the drainage channels to form a cascade; overflow from each lake flows to the next lake downstream. Yet, most efforts have tended to view the lakes in isolation. This study of the hydrology of Bangalore's lake system in its entirety simulates the lake system as a whole. The study explores approaches to management and theor impact on urban water security.

  10. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  11. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  12. Editors' Preface to Special Issue on Drinking Water Safety, Security, and Sustainability

    Science.gov (United States)

    Recognizing these needs, researchers from Zhejiang University (China), the US EPA and the University of Alberta (Canada) organized the “International Conference on Drinking Water Safety, Security and Sustainability” in October 2011 in Hangzhou, China. The conference was attended...

  13. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  14. Water Security Toolkit User Manual: Version 1.3 | Science ...

    Science.gov (United States)

    User manual: Data Product/Software The Water Security Toolkit (WST) is a suite of tools that help provide the information necessary to make good decisions resulting in the minimization of further human exposure to contaminants, and the maximization of the effectiveness of intervention strategies. WST assists in the evaluation of multiple response actions in order to select the most beneficial consequence management strategy. It includes hydraulic and water quality modeling software and optimization methodologies to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove or destroy contaminants, (5) locations in the network to take grab sample to confirm contamination or cleanup and (6) valves to close in order to isolate contaminated areas of the network.

  15. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  16. Taking the road less taken: reorienting the state for periurban water security

    NARCIS (Netherlands)

    Narain, Vishal; Ranjan, Pranay; Vij, S.; Dewan, Aman

    2017-01-01

    This paper describes the intervention strategy to improve water security in Sultanpur, a village in periurban Gurgaon, India. Most approaches to improving natural resource management in periurban contexts focus on mobilising the community; little attention is paid to reorienting the state or

  17. Notification: Evaluation of Benefits and Use of Office of Research and Development's Safe and Sustainable Water Resources Research

    Science.gov (United States)

    Project #OPE-FY17-0021, August 1, 2017. The EPA OIG plans to begin preliminary research to assess the benefits and use of the Office of Research and Development’s (ORD) Safe and Sustainable Water Resources research.

  18. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  19. Megacity precipitationsheds reveal tele-connected water security challenges

    Science.gov (United States)

    Wang-Erlandsson, Lan; Gordon, Line J.

    2018-01-01

    Urbanization is a global process that has taken billions of people from the rural countryside to concentrated urban centers, adding pressure to existing water resources. Many cities are specifically reliant on renewable freshwater regularly refilled by precipitation, rather than fossil groundwater or desalination. A precipitationshed can be considered the “watershed of the sky” and identifies the origin of precipitation falling in a given region. In this paper, we use this concept to determine the sources of precipitation that supply renewable water in the watersheds of the largest cities of the world. We quantify the sources of precipitation for 29 megacities and analyze their differences between dry and wet years. Our results reveal that 19 of 29 megacities depend for more than a third of their water supply on evaporation from land. We also show that for many of the megacities, the terrestrial dependence is higher in dry years. This high dependence on terrestrial evaporation for their precipitation exposes these cities to potential land-use change that could reduce the evaporation that generates precipitation. Combining indicators of water stress, moisture recycling exposure, economic capacity, vegetation-regulated evaporation, land-use change, and dry-season moisture recycling sensitivity reveals four highly vulnerable megacities (Karachi, Shanghai, Wuhan, and Chongqing). A further six megacities were found to have medium vulnerability with regard to their water supply. We conclude that understanding how upwind landscapes affect downwind municipal water resources could be a key component for understanding the complexity of urban water security. PMID:29534109

  20. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  1. Stormwater harvesting: Improving water security in South Africa's urban areas

    Directory of Open Access Journals (Sweden)

    Lloyd Fisher-Jeffes

    2017-01-01

    Full Text Available The drought experienced in South Africa in 2016 one of the worst in decades has left many urbanised parts of the country with limited access to water, and food production has been affected. If a future water crisis is to be averted, the country needs to conserve current water supplies, reduce its reliance on conventional surface water schemes, and seek alternative sources of water supply. Within urban areas, municipalities must find ways to adapt to, and mitigate the threats from, water insecurity resulting from, inter alia, droughts, climate change and increasing water demand driven by population growth and rising standards of living. Stormwater harvesting (SWH is one possible alternative water resource that could supplement traditional urban water supplies, as well as simultaneously offer a range of social and environmental benefits. We set out three position statements relating to how SWH can: improve water security and increase resilience to climate change in urban areas; prevent frequent flooding; and provide additional benefits to society. We also identify priority research areas for the future in order to target and support the appropriate uptake of SWH in South Africa, including testing the viability of SWH through the use of real-time control and managed aquifer recharge.

  2. Insight from the 5th World Water Forum on Securing Water for Food and Ecosystems in Africa : Report on BOCI Project BO-10-004-003: Water Conventions

    OpenAIRE

    Wageningen International

    2009-01-01

    Water scarcity is considered to be one of the largest threats for many parts of Africa. Under water scarce conditions reducing the consumption of water and preventing pollution of accessible water resources is essential. Combating water scarcity in both dimensions of quality and quantity is of special relevance for the LNV priority regions (including those in Water Mondiaal). Future LNV policies to address food security in Africa will affect the use, spread and fate of agrochemicals as well. ...

  3. The Concepts of Risk, Safety, and Security: Applications in Everyday Language.

    Science.gov (United States)

    Boholm, Max; Möller, Niklas; Hansson, Sven Ove

    2016-02-01

    The concepts of risk, safety, and security have received substantial academic interest. Several assumptions exist about their nature and relation. Besides academic use, the words risk, safety, and security are frequent in ordinary language, for example, in media reporting. In this article, we analyze the concepts of risk, safety, and security, and their relation, based on empirical observation of their actual everyday use. The "behavioral profiles" of the nouns risk, safety, and security and the adjectives risky, safe, and secure are coded and compared regarding lexical and grammatical contexts. The main findings are: (1) the three nouns risk, safety, and security, and the two adjectives safe and secure, have widespread use in different senses, which will make any attempt to define them in a single unified manner extremely difficult; (2) the relationship between the central risk terms is complex and only partially confirms the distinctions commonly made between the terms in specialized terminology; (3) whereas most attempts to define risk in specialized terminology have taken the term to have a quantitative meaning, nonquantitative meanings dominate in everyday language, and numerical meanings are rare; and (4) the three adjectives safe, secure, and risky are frequently used in comparative form. This speaks against interpretations that would take them as absolute, all-or-nothing concepts. © 2015 Society for Risk Analysis.

  4. Safe Drinking Water

    Centers for Disease Control (CDC) Podcasts

    2008-04-23

    Listen to this podcast to learn more about the steps that are taken to bring you clean tap water.  Created: 4/23/2008 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED).   Date Released: 5/1/2008.

  5. Community based adaptation options for climate change impacts on water resources: The case of Jordan

    OpenAIRE

    Hammouri Nezar; Al-Qinna Mohammad; Salahat Mohammad; Adamowski Jan; Prasher Shiv O.

    2015-01-01

    A strategic vision to ensure an adequate, safe and secure drinking water supply presents a challenge, particularly for such a small country as Jordan, faced with a critical supply-demand imbalance and a high risk of water quality deterioration. In order to provide sustainable and equitable long-term water management plans for the future, current and future demands, along with available adaptation options should be assessed through community engagement. An analysis of available water resources...

  6. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  7. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  8. Drinking Water Management and Governance in Canada: An Innovative Plan-Do-Check-Act (PDCA) Framework for a Safe Drinking Water Supply

    Science.gov (United States)

    Bereskie, Ty; Rodriguez, Manuel J.; Sadiq, Rehan

    2017-08-01

    Drinking water management in Canada is complex, with a decentralized, three-tiered governance structure responsible for safe drinking water throughout the country. The current approach has been described as fragmented, leading to governance gaps, duplication of efforts, and an absence of accountability and enforcement. Although there have been no major waterborne disease outbreaks in Canada since 2001, a lack of performance improvement, especially in small drinking water systems, is evident. The World Health Organization water safety plan approach for drinking water management represents an alternative preventative management framework to the current conventional, reactive drinking water management strategies. This approach has seen successful implementation throughout the world and has the potential to address many of the issues with drinking water management in Canada. This paper presents a review and strengths-weaknesses-opportunities-threats analysis of drinking water management and governance in Canada at the federal, provincial/territorial, and municipal levels. Based on this analysis, a modified water safety plan (defined as the plan-do-check-act (PDCA)-WSP framework) is proposed, established from water safety plan recommendations and the principles of PDCA for continuous performance improvement. This proposed framework is designed to strengthen current drinking water management in Canada and is designed to fit within and incorporate the existing governance structure.

  9. Drinking Water Management and Governance in Canada: An Innovative Plan-Do-Check-Act (PDCA) Framework for a Safe Drinking Water Supply.

    Science.gov (United States)

    Bereskie, Ty; Rodriguez, Manuel J; Sadiq, Rehan

    2017-08-01

    Drinking water management in Canada is complex, with a decentralized, three-tiered governance structure responsible for safe drinking water throughout the country. The current approach has been described as fragmented, leading to governance gaps, duplication of efforts, and an absence of accountability and enforcement. Although there have been no major waterborne disease outbreaks in Canada since 2001, a lack of performance improvement, especially in small drinking water systems, is evident. The World Health Organization water safety plan approach for drinking water management represents an alternative preventative management framework to the current conventional, reactive drinking water management strategies. This approach has seen successful implementation throughout the world and has the potential to address many of the issues with drinking water management in Canada. This paper presents a review and strengths-weaknesses-opportunities-threats analysis of drinking water management and governance in Canada at the federal, provincial/territorial, and municipal levels. Based on this analysis, a modified water safety plan (defined as the plan-do-check-act (PDCA)-WSP framework) is proposed, established from water safety plan recommendations and the principles of PDCA for continuous performance improvement. This proposed framework is designed to strengthen current drinking water management in Canada and is designed to fit within and incorporate the existing governance structure.

  10. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  11. Climate Change and Water Security in South Africa; Assessing Conflict and Coping Strategies in KwaZulu-Natal

    Science.gov (United States)

    Hosea, P. O.

    2017-12-01

    The focus on the security implication of climate change was intensified after the 2007 United Nations Security Council debate on climate change as a threat multiplier. In the light of this, Africa is identified as the continent highly vulnerable to climate change impacts due to its high dependence on climate sensitive economy, high poverty prevalence rate, weak institutional coping capacity as well as poor social infrastructure. In the past decades, the peculiarity of South Africa vis-à-vis climate change vulnerability, especially water scarcity, has become an issue of political and economic concern. The country is water stressed due to its arid and semi-arid conditions. In light of this, the Council for Scientific and Industrial Research (CSIR) (2010) assert that while global temperature increased by 0.80C over the last century, the surface temperature around the Southern Africa region increased by 2.00C over the same period. This connotes that climate change and its impact is inevitable for the region. This will further exacerbate the already stress water resources within South Africa. Owing to Cilliers (2009) and the Council on Foreign Relations (2016) argument that most conflict in Africa are largely driven by resource competition which are masqueraded as issues based on politics, religion or ethnicity, this study investigates the propensity of conflict dynamics in relation to climate change and water security. Using eco-violence theory as a theoretical framework and on the premises of human security, the study assess the security implications triggered by the impact of climate change on water security of rural communities in uMkhanyakude District Municipality, KwaZulu-Natal, South Africa. It focused on the extent to which this might trigger conflict as a coping mechanism among rural dwellers to water insecurity in order to inform policy options. Data for the were sourced using a mixed method paradigm where 385 survey questionnaire were distributed using

  12. DETERMINANTS OF HOUSEHOLD FOOD SECURITY: A COMPARATIVE ANALYSIS OF EASTERN AND WESTERN INDONESIA

    Directory of Open Access Journals (Sweden)

    Puspi Eko Wiranthi

    2014-04-01

    Full Text Available Indonesian Food Security Council in 2009 issued a Food Security and Vulnerability Atlas (FSVA which stated that there were 100 districts in Indonesia which were most vulnerable to food insecurity and 79% of which were located in eastern region. By using Susenas regular data in 2008, this study aimed to analyze determinants of household food security in eastern compared to western region. The ordered logistic regression model was employed to investigate the determinants of household food security. The result showed that most of households in Indonesia were vulnerable to food insecurity (41.76%. The percentage in eastern region (48.56% was higher than that in western region (41.76%. Increase in expenditure equivalent, age and education level of household head, female household head, small household size, household head’s occupation in non-agriculture and urban household would increase the probability of a household to become food secure in both regions. The difference was in the factor of access to electricity in eastern and access to safe drinking water and loan in western region. Policies which aim to increase education, credit access, and intensive family planning have big roles in improving household food security.

  13. Food and water security in a changing arctic climate

    International Nuclear Information System (INIS)

    White, Daniel M; Gerlach, S Craig; Loring, Philip; Tidwell, Amy C; Chambers, Molly C

    2007-01-01

    In the Arctic, permafrost extends up to 500 m below the ground surface, and it is generally just the top metre that thaws in summer. Lakes, rivers, and wetlands on the arctic landscape are normally not connected with groundwater in the same way that they are in temperate regions. When the surface is frozen in winter, only lakes deeper than 2 m and rivers with significant flow retain liquid water. Surface water is largely abundant in summer, when it serves as a breeding ground for fish, birds, and mammals. In winter, many mammals and birds are forced to migrate out of the Arctic. Fish must seek out lakes or rivers deep enough to provide good overwintering habitat. Humans in the Arctic rely on surface water in many ways. Surface water meets domestic needs such as drinking, cooking, and cleaning as well as subsistence and industrial demands. Indigenous communities depend on sea ice and waterways for transportation across the landscape and access to traditional country foods. The minerals, mining, and oil and gas industries also use large quantities of surface water during winter to build ice roads and maintain infrastructure. As demand for this limited, but heavily-relied-upon resource continues to increase, it is now more critical than ever to understand the impacts of climate change on food and water security in the Arctic

  14. “Is it Safe?” Risk Perception and Drinking Water in a Vulnerable Population

    Directory of Open Access Journals (Sweden)

    Nicholas Spence

    2012-11-01

    Full Text Available Access to safe drinking water is a pressing social policy issue globally. Despite the milestones reached in this area of Canadian public health, marginalized and vulnerable populations, including those founded on racialized identity, such as First Nations, continue to be plagued by accessibility issues. This work sheds new perspective on the issue, arguing for a research and policy focus that is inclusive of risk perception. A model of risk perception of drinking water is developed and tested for First Nations on reserve in Canada using the 2001 Aboriginal Peoples Survey. It is shown that the analytical use of racialized identity advances understanding of risk perception and the environment (water. Moreover, a large degree of heterogeneity within the First Nation population across a number of social determinants of risk perception illustrates the shortcomings of framing the issue in a simplistic manner (First Nation population versus general population. Implications for risk research, including risk communication & management, and policy are provided.

  15. A short overview of measures for securing water resources for irrigated crop production

    DEFF Research Database (Denmark)

    Jensen, Christian Richardt; Ørum, Jens Erik; Pedersen, Søren Marcus

    2014-01-01

    Agriculture is the main user of limited fresh water resources in the world. Optimisation of agricultural water resources and their use can be obtained by both agronomical and political incentives. Important options are: reduction of the loss of irrigation water in conveyance before it reaches...... of the 'virtual water' principles so that water-rich regions secure food supply to dry regions; reduction in waste of food, feed and biofuel from post-harvest to the end consumer; changing of food composition to less water-consuming products; regulating amount of irrigation water by rationing, subsidies or water...... pricing to support water-saving measures such as use of drip, irrigation scheduling and DI. The potential for water saving for different measures is discussed and estimated. Reduction in waste of food and loss of irrigation water from conveyance source to farm both has a great potential for water saving...

  16. Investigating Food and Agribusiness Corporations as Global Water Security, Management and Governance Agents: The case of Nestlé, Bunge and Cargill

    Directory of Open Access Journals (Sweden)

    Suvi Sojamo

    2012-10-01

    Full Text Available This article investigates the agency of the world’s largest food and agribusiness corporations in global water security via case studies of Nestlé, Bunge and Cargill by analysing their position in the political economy of the world agro-food system and the ways they intentionally and non-intentionally manage and govern water in their value chains and wider networks of influence. The concentrated power of a few corporations in global agro-food value chains and their ability to influence the agro-food market dynamics and networks throughout the world pose asymmetric conditions for reaching not only global food security but also water security. The article will analyse the different forms of power exercised by the corporations in focus in relation to global water security and the emerging transnational water governance regime, and the extent to which their value chain position and stakeholder interaction reflect or drive their actions. Due to their vast infrastructural and technological capacity and major role in the global agro-food political economy, food and agribusiness corporations cannot avoid increasingly engaging, for endogenous and exogenous reasons, in multi-stakeholder initiatives and partnerships to devise methods of managing the agro-food value chains and markets to promote global water security. However, their asymmetric position in relation to their stakeholders demands continuous scrutiny.

  17. Balancing food security and water demand for freshwater ecosystems

    Science.gov (United States)

    Pastor, Amandine; Palazzo, Amanda; Havlik, Petr; Obersteiner, Michael; Biemans, Hester; Wada, Yoshihide; Kabat, Pavel; Ludwig, Fulco

    2017-04-01

    Water is not an infinite resource and demand from irrigation, household and industry is constantly increasing. This study focused on including global water availability including environmental flow requirements with water withdrawal from irrigation and other sectors at a monthly time-step in the GLOBIOM model. This model allows re-adjustment of land-use allocation, crop management, consumption and international trade. The GLOBIOM model induces an endogenous change in water price depending on water supply and demand. In this study, the focus was on how the inclusion of water resources affects land-use and, in particular, how global change will influence repartition of irrigated and rainfed lands at global scale. We used the climate change scenario including a radiative forcing of 8.5 W/m2 (RCP8.5), the socio-economic scenario (SSP2: middle-of-road), and the environmental flow method based on monthly flow allocation (the Variable Monthly Flow method) with high and low restrictions. Irrigation withdrawals were adjusted to a monthly time-step to account for biophysical water limitations at finer time resolution. Our results show that irrigated land might decrease up to 40% on average depending on the choice of EFR restrictions. Several areas were identified as future hot-spots of water stress such as the Mediterranean and Middle-East regions. Other countries were identified to be in safe position in terms of water stress such as North-European countries. Re-allocation of rainfed and irrigated land might be useful information for land-use planners and water managers at an international level to decide on appropriate legislations on climate change mitigation/adaptation when exposure and sensitivity to climate change is high and/or on adaptation measures to face increasing water demand. For example, some countries are likely to adopt measures to increase their water use efficiencies (irrigation system, soil and water conservation practices) to face water shortages, while

  18. Water for development. World Water 2002 points to mounting challenges

    International Nuclear Information System (INIS)

    Rickwood, P.

    2002-01-01

    A looming crisis that overshadows nearly two-thirds of the Earth's population is drawing closer because of continued human mismanagement of water, population growth and changing weather patterns. In a joint statement, United Nations organizations drew attention to problems on the occasion of World Water Day 22 March 2002, for which the IAEA was the lead coordinating agency. By 2025, if present consumption patterns continue, about five billion people will be living in areas where it will be difficult or impossible to meet all their needs for fresh water. Half of them will face severe shortages. The UN organizations said that the implications will be extreme for the people most affected, who are among the world's poorest, limiting their ability to grow crops, which they need to survive, heightening disease and threatening States' national security. In the UN Millennium Declaration world leaders made a commitment to halve the number of people without access to safe and affordable water. In his World Water Day address, the UN Secretary General reported that, increasingly, countries with expertise in the management of watersheds and flood-plains, or with experience in efficient irrigation, are sharing the knowledge with others. The IAEA is among UN agencies offering a wide array of responses to the crisis, providing Member States with skills to apply isotope hydrology, to better manage groundwater. The technique permits reliable and rapid mapping of underground water sources so that they can be used safely without being exhausted. The IAEA also fosters the development of desalination to turn salt water into sweet water

  19. Household water treatment systems: A solution to the production of safe drinking water by the low-income communities of Southern Africa

    Science.gov (United States)

    Mwabi, J. K.; Adeyemo, F. E.; Mahlangu, T. O.; Mamba, B. B.; Brouckaert, B. M.; Swartz, C. D.; Offringa, G.; Mpenyana-Monyatsi, L.; Momba, M. N. B.

    One of the United Nations Millennium Development Goals is to reduce to half by 2015 the number of people, worldwide, who lack access to safe water. Due to the numerous deaths and illnesses caused by waterborne pathogens, various household water treatment devices and safe storage technologies have been developed to treat and manage water at the household level. The new approaches that are continually being examined need to be durable, lower in overall cost and more effective in the removal of the contaminants. In this study, an extensive literature survey was conducted to regroup various household treatment devices that are suitable for the inexpensive treatment of water on a household basis. The survey has resulted in the selection of four household treatment devices: the biosand filter (BSF), bucket filter (BF), ceramic candle filter (CCF) and the silver-impregnated porous pot filter (SIPP). The first three filters were manufactured in a Tshwane University of Technology workshop, using modified designs reported in literature. The SIPP filter is a product of the Tshwane University of Technology. The performance of the four filters was evaluated in terms of flow rate, physicochemical contaminant (turbidity, fluorides, phosphates, chlorophyll a, magnesium, calcium and nitrates) and microbial contaminant ( Escherichia coli, Vibrio cholerae, Salmonella typhimurium, Shigella dysenteriae) removals. The flow rates obtained during the study period were within the recommended limits (171 l/h, 167 l/h, 6.4 l/h and 3.5 l/h for the BSF, BF, CCF and SIPP, respectively). Using standard methods, the results of the preliminary laboratory and field studies with spiked and environmental water samples indicated that all filters decreased the concentrations of contaminants in test water sources. The most efficiently removed chemical contaminant in spiked water was fluoride (99.9%) and the poorest removal efficiency was noted for magnesium (26-56%). A higher performance in chemical

  20. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  1. Enabling Water-Energy–Food Nexus: A New Approach for Sustainable Agriculture and Food Security in Mountainous Landlocked Countries

    Directory of Open Access Journals (Sweden)

    Tek Bahadur Gurung

    2016-12-01

    Full Text Available Majority of landlocked mountainous countries are poorly ranked in Human Development Index (HDI, mostly due to poor per capita agriculture production, increasing population, unemployment, expensive and delayed transportation including several other factors. Generally, economy of such countries substantially relies on subsistence agriculture, tourism, hydropower and largely on remittance etc. Recently, it has been argued that to utilize scarce suitable land efficiently for food production, poor inland transport, hydropower, irrigation, drinking water in integration with other developmental infrastructures, an overarching policy linking water - energy – food nexus within a country for combating water, energy and food security would be most relevant. Thus, in present paper it has been opined that promotion of such linkage via nexus approach is the key to sustainable development of landlocked mountainous countries. Major land mass in mountainous countries like Nepal remains unsuitable for agriculture, road and other infrastructure profoundly imposing food, nutrition and energy security. However, large pristine snowy mountains function as wildlife sanctuaries, pastures, watershed, recharge areas for regional and global water, food and energy security. In return, landlocked mountainous countries are offered certain international leverages. For more judicious trade off, it is recommended that specific countries aerial coverage of mountains would be more appropriate basis for such leverages. Moreover, for sustainability of mountainous countries an integrated approach enabling water - energy – food nexus via watershed-hydropower-irrigation-aquaculture-agriculture-integrated linking policy model is proposed. This model would enable protection of watershed for pico, micro, and mega hydro power plants and tail waters to be used for aquaculture or irrigation or drinking water purposes for food and nutrition security.

  2. Framework of the NPP I and C Security for Regulatory Guidance

    International Nuclear Information System (INIS)

    Kim, Young Mi; Jeong, Choong Heui

    2013-01-01

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems

  3. Framework of the NPP I and C Security for Regulatory Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Mi; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-10-15

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems.

  4. Alternative Options for Safe Drinking Water in Arsenic and Salinity Affected Bornal-Iliasabad Union of Kalia Upazila, Narail District, Bangladesh

    Science.gov (United States)

    Rahman, M. M.; Hasan, M. A.; Ahmed, K. M.; Nawrin, N.

    2016-12-01

    The study area, Bornal-Ilisabad union, Kalia, Narail is one of the most vulnerable areas of Bangladesh in terms of access to safe drinking water. Shallow groundwater of this area is highly arsenic contaminated (mostly >500 μg/L) and deep groundwater is saline (EC ranges 1 to 8 mS/cm). Local communities rely on rainwater for drinking and cooking purposes during the monsoon and rest of the year they use surface water from pond which are mostly polluted. In areas where surface water is not available people are compelled to use arsenic contaminated groundwater and thus exposing themselves to serious health hazard. Principal objective of the research is to evaluate the effectiveness of managed aquifer recharge (MAR) and subsurface arsenic removal (SAR) technology in mitigating groundwater salinity and arsenic, to provide alternative sources of safe water. Surface water (pond water) and rainwater collected from roof top are used as source water to be recharged into the target aquifer for the MAR system. Source water is filtered through a sand filtration unit to remove turbidity and microorganisms before recharging through infiltration wells. For SAR system, on the other hand, a certain volume (2000L) of groundwater is abstracted from the target aquifer and then aerated for about half an hour to saturate with oxygen. The oxygenated water is injected into the aquifer and kept there for 6-8 hours and then abstracted for use. The MAR system constructed in the study area is found very effective in reducing groundwater salinity. The electrical conductivity (EC) of the groundwater of MAR system has been reduced 72-81% from the initial EC value of 3.4 mS/cm. A significant improvement in groundwater arsenic and iron concentration is also observed. The system is yielding groundwater with arsenic within permissible limit of Bangladesh drinking water standard (50 μg/L) which was 100 μg/L before introduction of MAR system. The SAR system is also found effective in reducing

  5. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  6. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  7. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  8. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  9. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  10. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  11. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  12. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    Science.gov (United States)

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  13. Learning with Security

    Science.gov (United States)

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  14. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  15. Evaluation of surface water dynamics for water-food security in seasonal wetlands, north-central Namibia

    Directory of Open Access Journals (Sweden)

    T. Hiyama

    2014-09-01

    Full Text Available Agricultural use of wetlands is important for food security in various regions. However, land-use changes in wetland areas could alter the water cycle and the ecosystem. To conserve the water environments of wetlands, care is needed when introducing new cropping systems. This study is the first attempt to evaluate the water dynamics in the case of the introduction of rice-millet mixed-cropping systems to the Cuvelai system seasonal wetlands (CSSWs in north-central Namibia. We first investigated seasonal changes in surface water coverage by using satellite remote sensing data. We also assessed the effect of the introduction of rice-millet mixed-cropping systems on evapotranspiration in the CSSWs region. For the former investigation, we used MODIS and AMSR-E satellite remote sensing data. These data showed that at the beginning of the wet season, surface water appears from the southern (lower part and then expands to the northern (higher part of the CSSWs. For the latter investigation, we used data obtained by the classical Bowen ratio-energy balance (BREB method at an experimental field site established in September 2012 on the Ogongo campus, University of Namibia. This analysis showed the importance of water and vegetation conditions when introducing mixed-cropping to the region.

  16. Method of safely operating nuclear reactor

    International Nuclear Information System (INIS)

    Ochiai, Kanehiro.

    1976-01-01

    Purpose: To provide a method of safely operating an nuclear reactor, comprising supporting a load applied to a reactor container partly with secondary container facilities thereby reducing the load borne by the reactor container when water is injected into the core to submerge the core in an emergency. Method: In a reactor emergency, water is injected into the reactor core thereby to submerge the core. Further, water is injected into a gap between the reactor container and the secondary container facilities. By the injection of water into the gap between the reactor container and the secondary container facilities a large apparent mass is applied to the reactor container, as a result of which the reactor container undergoes the same vibration as that of the secondary container facilities. Therefore, the load borne by the reactor container itself is reduced and stress at the bottom part of the reactor container is released. This permits the reactor to be operated more safely. (Moriyama, K.)

  17. "It makes us really look inferior to outsiders": Coping with psychosocial experiences associated with the lack of access to safe water and sanitation.

    Science.gov (United States)

    Bisung, Elijah; Elliott, Susan J

    2017-11-09

    This paper explores daily experiences and coping resources related to the lack of access to safe water and adequate sanitation in Usoma, a lakeshore community in Western Kenya. A qualitative approach that involved 10 focus group discussions and 9 key informant interviews with community leaders, volunteers and professionals was used to explore the research objectives. Data were collected from June to August 2013. Daily practices and experiences around water and sanitation, such as water collection, open defecation and shared toilets, were a major concern to residents. In the absence of safe water, residents used social networks and support, financial resources and the nearby Lake Victoria as coping resources. Findings from this study are important for mobilizing resources in vulnerable settings as a first step towards designing community-based interventions. For public health practice, practitioners must work with - and collaborate across - sectors to enhance and strengthen social networks and cohesion, and protect the natural environment while working toward addressing water-related challenges in deprived settings.

  18. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  19. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  20. Swimming Safely (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    In the summertime, families will be flocking to pools for relaxation and relief from the heat. A few simple precautions can help ensure a safe day in the water. In this podcast, Michele Hlavsa discusses ways to stay safe at the pool.

  1. Analysis of Water Resources Supply and Demand and Security of Water Resources Development in Irrigation Regions of the Middle Reaches of the Heihe River Basin, Northwest China

    Institute of Scientific and Technical Information of China (English)

    JI Xi-bin; KANG Er-si; CHEN Ren-sheng; ZHAO Wen-zhi; XIAO Sheng-chun; JIN Bo-wen

    2006-01-01

    Based on the data for meteorology, hydrology, soil, planting, vegetation, and socio-economic development of the irrigation region in the middle reaches of the Heihe River basin, Northwest China, the model of balance of water supply and demand in the region was established, and the security of water resource was assessed, from which the results that the effects of unified management of water resources in the Heihe River basin between Gansu Province and Inner Mongolia on regional hydrology are significant with a decrease in water supply diverted from Heihe River and an increase in groundwater extracted. In addition, it was found that the groundwater level has been steadily decreasing due to over pumping and decrease in recharges. In present year (2003), the volume of potential groundwater in the irrigation districts is far small because of the groundwater overdraft; even in the particular regions, there is no availability of groundwater resources for use. By 2003, water supply is not sufficient to meet the water demand in the different irrigation districts, the sustainable development and utilization of water resources are not secured, and the water supply crisis occurs in Pingchuan irrigation district. Achieving water security for the sustainable development of society, agriculture, economy, industry, and livelihoods while maintaining or improving the abilities of the management and planning of water resources, determining of the reasonable percentage between water supply and groundwater utilization and water saving in agricultural irrigation are taken into account. If this does not occur, it is feared that the present performance of water development and planning may further aggravate the problem of scarcities of water resources and further damage the fragile ecological system.

  2. Loss of the CNA I secured river water system: analysis and effect evaluation

    International Nuclear Information System (INIS)

    Berra, Sandra; Guala, Mariana I.; Lorenzo, Andrea T.; Raffo Calderon, Maria C.; Urrutia, Guillermo

    1999-01-01

    In this work the evolution of the plant parameters is evaluated in the case of a loss of the secured circuit of river water (system UK). In particular the systems which are affected for this loss were studied. It was evaluated the functional degradation of these systems. (author)

  3. Public Perception of the Millennium Development Goals on Access to Safe Drinking Water in Cross River State, Nigeria

    Science.gov (United States)

    Eni, David D.; Ojong, William M.

    2014-01-01

    This study evaluated the public perception of Millennium Development Goals (MDGs) of environmental sustainability with focus on the MDG target which has to do with reducing the proportion of people without access to safe drinking water in Cross River State, Nigeria. The stratified and systematic sampling techniques were adopted for the study,…

  4. Socio-Hydrological Observatory for Water Security (SHOWS): Examples of Adaptation Strategies With Next Challenges from Brazilian Risk Areas

    Science.gov (United States)

    Souza, F. A. A. D.; Mendiondo, E. M.; Taffarello, D.; Guzmán-Arias, D.; Fava, M. C.; Abreu, F.; Freitas, C. C.; de Macedo, M. B.; Estrada, C. R.; do Lago, C. A.

    2017-12-01

    In Brazil, more than 40,000 hot-spot areas, with vulnerable human settlements with ca. 120 million inhabitants and responsible of 60% of Brazilian Gross Net Product, are threatened by hydrological-driven disaster risks. In these areas, local resilient actions and adaptation strategies do integrate the current Brazilian Act and Regulation of Laws of urban waters, climate change and civil protection. However, these initiatives are still under slow progress, especially to cope with floods, landslides, droughts, progressive biodiversity losses and energy burnouts. Here we address these hot-spots through the concept of Socio-Hydrological Observatory for Water Security (SHOWS), with a mix of adaptation strategies, open-source, big data analysis and societal feedbacks. On the one hand, SHOWS merges strategies like the dynamic framework of water security (Srinivasan et al, 2017), drought risk mapping (Rossato et al, 2017) and water securitization under varying water demand and climate change until year 2100 (Mohor & Mendiondo, 2017; Guzmán-Arias et al, 2017). SHOWS acknowledges different perspectives of water insecurity, several spatiotemporal scales and regime shifts in socio-hydrologic systems. On the one hand, SHOWS links field monitoring during water insecurity hazards (Taffarello et al, 2016), ecosystem-based adaptation networks, and decision-making and big data sources to disaster management (Horita et al, 2017). By using selected examples from two Brazilian running interdisciplinary research aliances, i.e. CAPES-ProAlertas CEMADEN-CEPED/USP and the CNPq/FAPESP National Institute of Science & Technology on Climate Change-II Water Security, we also face the limits, the pros and cons of SHOWS' assumptions. Through real-cases paradoxes, (i.e. 2013/2014 drought), water dashboards and coevolution trends (i.e. impacts on river basin committees from scenarios until 2050, 2100 in NE & SE Brazil), SHOWS helps on guiding decisionmaking for next societal steps of water

  5. Climate change and water security with a focus on the Arctic

    Directory of Open Access Journals (Sweden)

    Birgitta Evengard

    2011-10-01

    Full Text Available Water is of fundamental importance for human life; access to water of good quality is of vital concern for mankind. Currently however, the situation is under severe pressure due to several stressors that have a clear impact on access to water. In the Arctic, climate change is having an impact on water availability by melting glaciers, decreasing seasonal rates of precipitation, increasing evapotranspiration, and drying lakes and rivers existing in permafrost grounds. Water quality is also being impacted as manmade pollutants stored in the environment are released, lowland areas are flooded with salty ocean water during storms, turbidity from permafrost-driven thaw and erosion is increased, and the growth or emergence of natural pollutants are increased. By 2030 it is estimated that the world will need to produce 50% more food and energy which means a continuous increase in demand for water. Decisionmakers will have to very clearly include life quality aspects of future generations in the work as impact of ongoing changes will be noticeable, in many cases, in the future. This article will focus on effects of climate-change on water security with an Arctic perspective giving some examples from different countries how arising problems are being addressed.

  6. User preferences and willingness to pay for safe drinking water: Experimental evidence from rural Tanzania.

    Science.gov (United States)

    Burt, Zachary; Njee, Robert M; Mbatia, Yolanda; Msimbe, Veritas; Brown, Joe; Clasen, Thomas F; Malebo, Hamisi M; Ray, Isha

    2017-01-01

    Almost half of all deaths from drinking microbiologically unsafe water occur in Sub-Saharan Africa. Household water treatment and safe storage (HWTS) systems, when consistently used, can provide safer drinking water and improve health. Social marketing to increase adoption and use of HWTS depends both on the prices of and preferences for these systems. This study included 556 households from rural Tanzania across two low-income districts with low-quality water sources. Over 9 months in 2012 and 2013, we experimentally evaluated consumer preferences for six "low-cost" HWTS options, including boiling, through an ordinal ranking protocol. We estimated consumers' willingness to pay (WTP) for these options, using a modified auction. We allowed respondents to pay for the durable HWTS systems with cash, chickens or mobile money; a significant minority chose chickens as payment. Overall, our participants favored boiling, the ceramic pot filter and, where water was turbid, PuR™ (a combined flocculant-disinfectant). The revealed WTP for all products was far below retail prices, indicating that significant scale-up may need significant subsidies. Our work will inform programs and policies aimed at scaling up HWTS to improve the health of resource-constrained communities that must rely on poor-quality, and sometimes turbid, drinking water sources. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Water Governance in Bangladesh: An Evaluation of Institutional and Political Context

    Directory of Open Access Journals (Sweden)

    Ngai Weng Chan

    2016-09-01

    Full Text Available Water crises are often crises of governance. To address interrelated issues of securing access to sustainable sources of safe water for the world’s populations, scholar and practitioners have suggested fostering improved modes of water governance that support the implementation of integrated water resource management (IWRM. Recently, implementation of an IWRM approach was announced as a target for achieving Goal 6 of the Sustainable Development Goals (SDGs. This study employs an analytical hierarchy process with a SWOT analysis to assess the current institutional and political context of water governance in Bangladesh and evaluate IWRM as a means to achieve the SDGs.

  8. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  9. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  10. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  11. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  12. Hydrogeological investigation for assessment of the sustainability of low-arsenic aquifers as a safe drinking water source in regions with high-arsenic groundwater in Matlab, southeastern Bangladesh

    Science.gov (United States)

    von Brömssen, Mattias; Markussen, Lars; Bhattacharya, Prosun; Ahmed, Kazi Matin; Hossain, Mohammed; Jacks, Gunnar; Sracek, Ondra; Thunvik, Roger; Hasan, M. Aziz; Islam, M. Mainul; Rahman, M. Mokhlesur

    2014-10-01

    Exploitation of groundwater from shallow, high prolific Holocene sedimentary aquifers has been a main element for achieving safe drinking water and food security in Bangladesh. However, the presence of elevated levels of geogenic arsenic (As) in these aquifers has undermined this success. Except for targeting safe aquifers through installations of tubewells to greater depth, no mitigation option has been successfully implemented on a larger scale. The objective of this study has been to characterise the hydrostratigraphy, groundwater flow patterns, the hydraulic properties to assess the vulnerability of low-arsenic aquifers at Matlab, in south-eastern Bangladesh, one of the worst arsenic-affected areas of the country. Groundwater modelling, conventional pumping test using multilevel piezometers, hydraulic head monitoring in piezometer nests, 14C dating of groundwater and assessment of groundwater abstraction were used. A model comprising of three aquifers covering the top 250 m of the model domain showed the best fit for the calibration evaluation criteria. Irrigation wells in the Matlab area are mostly installed in clusters and account for most of the groundwater abstraction. Even though the hydraulic heads are affected locally by seasonal pumping, the aquifer system is fully recharged from the monsoonal replenishment. Groundwater simulations demonstrated the presence of deep regional flow systems with recharge areas in the eastern, hilly part of Bangladesh and shallow small local flow systems driven by local topography. Based on modelling results and 14C groundwater data, it can be concluded that the natural local flow systems reach a depth of 30 m b.g.l. in the study area. A downward vertical gradient of roughly 0.01 down to 200 m b.g.l. was observed and reproduced by calibrated models. The vertical gradient is mainly the result of the aquifer system and properties rather than abstraction rate, which is too limited at depth to make an imprint. Although

  13. Safe drinking during cancer treatment

    Science.gov (United States)

    ... ency/patientinstructions/000060.htm Drinking water safely during cancer treatment To use the sharing features on this page, please enable JavaScript. During and right after your cancer treatment, your body may not be able to protect ...

  14. Amazon rainforest modulation of water security in the Pantanal wetland.

    Science.gov (United States)

    Bergier, Ivan; Assine, Mario L; McGlue, Michael M; Alho, Cleber J R; Silva, Aguinaldo; Guerreiro, Renato L; Carvalho, João C

    2018-04-01

    The Pantanal is a large wetland mainly located in Brazil, whose natural resources are important for local, regional and global economies. Many human activities in the region rely on Pantanal's ecosystem services including cattle breeding for beef production, professional and touristic fishing, and contemplative tourism. The conservation of natural resources and ecosystems services provided by the Pantanal wetland must consider strategies for water security. We explored precipitation data from 1926 to 2016 provided by a regional network of rain gauge stations managed by the Brazilian Government. A timeseries obtained by dividing the monthly accumulated-rainfall by the number of rainy days indicated a positive trend of the mean rate of rainy days (mm/day) for the studied period in all seasons. We assessed the linkage of Pantanal's rainfall patterns with large-scale climate data in South America provided by NOAA/ESRL from 1949 to 2016. Analysis of spatiotemporal correlation maps indicated that, in agreement with previous studies, the Amazon biome plays a significant role in controlling summer rainfall in the Pantanal. Based on these spatiotemporal maps, a multi-linear regression model was built to predict the mean rate of summer rainy days in Pantanal by 2100, relative to the 1961-1990 mean reference. We found that the deforestation of the Amazon rainforest has profound implications for water security and the conservation of Pantanal's ecosystem services. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  16. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  17. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  18. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  19. Integral Inherently Safe Light Water Reactor (I2S-LWR)

    Energy Technology Data Exchange (ETDEWEB)

    Petrovic, Bojan [Georgia Inst. of Technology, Atlanta, GA (United States); Memmott, Matthew [Brigham Young Univ., Provo, UT (United States); Boy, Guy [Florida Inst. of Technology, Melbourne, FL (United States); Charit, Indrajit [Univ. of Idaho, Moscow, ID (United States); Manera, Annalisa [Univ. of Michigan, Ann Arbor, MI (United States); Downar, Thomas [Univ. of Michigan, Ann Arbor, MI (United States); Lee, John [Univ. of Michigan, Ann Arbor, MI (United States); Muldrow, Lycurgus [Morehouse College, Atlanta, GA (United States); Upadhyaya, Belle [Univ. of Tennessee, Knoxville, TN (United States); Hines, Wesley [Univ. of Tennessee, Knoxville, TN (United States); Haghighat, Alierza [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    2017-10-02

    This final report summarizes results of the multi-year effort performed during the period 2/2013- 12/2016 under the DOE NEUP IRP Project “Integral Inherently Safe Light Water Reactors (I2S-LWR)”. The goal of the project was to develop a concept of a 1 GWe PWR with integral configuration and inherent safety features, at the same time accounting for lessons learned from the Fukushima accident, and keeping in mind the economic viability of the new concept. Essentially (see Figure 1-1) the project aimed to implement attractive safety features, typically found only in SMRs, to a larger power (1 GWe) reactor, to address the preference of some utilities in the US power market for unit power level on the order of 1 GWe.

  20. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  1. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  2. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  3. Implementing AORN recommended practices for a safe environment of care, part II.

    Science.gov (United States)

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  4. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  5. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  6. Evaluation of Water Security in Kathmandu Valley before and after Water Transfer from another Basin

    Directory of Open Access Journals (Sweden)

    Bhesh Raj Thapa

    2018-02-01

    Full Text Available Kathmandu Upatyaka Khanepani Limited (KUKL has planned to harness water from outside the valley from Melamchi as an inter-basin project to supply water inside the ring road (core valley area of the Kathmandu Valley (KV. The project, called the “Melamchi Water Supply Project (MWSP”, is expected to have its first phase completed by the end of September 2018 and its second phase completed by the end of 2023 to supply 170 MLD (million liters a day through the first phase and an additional 340 MLD through the second phase. The area has recently faced a severe water deficit and KUKL’s existing infrastructure has had a limited capability, supplying only 19% of the water that is demanded in its service areas during the dry season and 31% during the wet season. In this context, this study aims to assess the temporal trends and spatial distribution of household water security index (WSI, defined as a ratio of supply to demand for domestic water use for basic human water requirements (50 L per capita per day (lpcd and economic growth (135 lpcd as demand in pre- and post-MWSP scenarios. For this purpose, data on water demand and supply with infrastructure were used to map the spatial distribution of WSI and per capita water supply using ArcMap. Results show a severe water insecurity condition in the year 2017 in all KUKL service areas (SAs, which is likely to improve after completion of the MWSP. It is likely that recent distribution network and strategies may lead to inequality in water distribution within the SAs. This can possibly be addressed by expanding existing distribution networks and redistributing potable water, which can serve an additional 1.21 million people in the area. Service providers may have to develop strategies to strengthen a set of measures including improving water supply infrastructures, optimizing water loss, harnessing additional water from hills, and managing water within and outside the KUKL SAs in the long run to cover

  7. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  8. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    Member States “Food and nutrition security exists when all people at all times have physical, social and economic access to food, which is safe and consumed in sufficient quantity and quality to meet their dietary needs and food preferences, and is supported by an environment of adequate sanitation...... by increasing availability, affordability and consumption of biodiverse, safe, nutritious foods aligned with dietary recommendations and environmental sustainability.  Given that the number of chronically undernourished (stunted) could double over next 15 years, the Post-2015 Agenda and its Poverty Reduction......The term “food and nutrition security” reflects the multisector collaboration needed between those working with food security and nutrition security. The term expresses an integrated development goal to help guide implementation of policy and cost-effective programmatic action: As agreed by FAO...

  9. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  10. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  11. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  12. Economics of place-based monitoring under the safe drinking water act, part I: spatial and temporal patterns of contaminants, and design of screening strategies.

    Science.gov (United States)

    Brands, Edwin; Rajagopal, R

    2008-08-01

    The goals of environmental legislation and associated regulations are to protect public health, natural resources, and ecosystems. In this context, monitoring programs should provide timely and relevant information so that the regulatory community can implement legislation in a cost-effective and efficient manner. The Safe Drinking Water Act (SDWA) of 1974 attempts to ensure that public water systems (PWSs) supply safe water to its consumers. As is the case with many other federal environmental statutes, SDWA monitoring has been implemented in relatively uniform fashion across the USA. In this three part series, spatial and temporal patterns in water quality data are utilized to develop, compare, and evaluate the economic performance of alternative place-based monitoring approaches to current monitoring practice. Under the Safe Drinking Water Act (SDWA), a common list of over 90 contaminants is analyzed nationwide using EPA-authorized laboratory procedures. National and state-level summaries of SDWA data have shown that not all contaminants occur in all places at all times. This hypothesis is confirmed and extended by showing that only a few (less than seven) contaminants are of concern in any one of 19 Iowa surface water systems studied. These systems collectively serve about 350,000 people and their sizes vary between 1,200 and 120,000. The distributions of contaminants found in these systems are positively skewed, with many non-detect measurements. A screening strategy to identify such contaminants in individual systems is presented. These findings have significant implications not only for the design of alternative monitoring programs, but also in multi-billion-dollar decisions that influence the course of future drinking water infrastructure, repair, and maintenance investments.

  13. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    Science.gov (United States)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted

  14. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-08-01

    An automated approach to facility safeguards effectiveness evaluation has been developed. This automated process, called Safeguards Automated Facility Evaluation (SAFE), consists of a collection of a continuous stream of operational modules for facility characterization, the selection of critical paths, and the evaluation of safeguards effectiveness along these paths. The technique has been implemented on an interactive computer time-sharing system and makes use of computer graphics for the processing and presentation of information. Using this technique, a comprehensive evaluation of a safeguards system can be provided by systematically varying the parameters that characterize the physical protection components of a facility to reflect the perceived adversary attributes and strategy, environmental conditions, and site operational conditions. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  15. Nuclear desalination option for the international reactor innovative and secure (IRIS) design

    International Nuclear Information System (INIS)

    Ingersoll, D. T.; Binder, J. L.; Conti, D.; Ricotti, M. E.

    2004-01-01

    The worldwide demand for potable water is on the rise. A recent market survey by the World Resources Institute shows a doubling in desalinated water production every ten years from both seawater and brackish water sources. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh per cubic meter of produced desalted water. At current U.S. water use rates, 1 kW of energy capacity per capita (or 1000 MW for every one million people) would be required to meet water needs with desalted water. The choice of the desalination technology determines the form of energy required: electrical energy for reverse osmosis systems, relatively low quality thermal energy for distillation systems, and both electrical and thermal energy for hybrid systems such as pre-heat RO systems. Nuclear energy plants are attractive for large scale desalination application. Nuclear plants can provide both electrical and thermal energy in an integrated, co-generated fashion to produce a spectrum of energy products including electricity, desalted water, process heat, district heating, and potentially hydrogen generation. A particularly attractive option for nuclear desalination is to couple it with an advanced, modular, passively safe reactor design such as the International Reactor Innovative and Secure (IRIS) plant. This allows for countries with smaller electrical grid needs and infrastructure to add new electrical and desalination capacity in smaller increments and at distributed sites. The safety by design nature of the IRIS reactor will ensure a safe and reliable source of energy even for countries with limited nuclear power experience and infrastructure. Two options for the application of the IRIS nuclear power plant to the cogeneration of electricity and desalted water are presented, including a coupling to a reverse osmosis plant and a multistage flash distillation plant. The results from an economic assessment of the two options are also presented.(author)

  16. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  17. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  18. A triangular fuzzy TOPSIS-based approach for the application of water technologies in different emergency water supply scenarios.

    Science.gov (United States)

    Qu, Jianhua; Meng, Xianlin; Yu, Huan; You, Hong

    2016-09-01

    Because of the increasing frequency and intensity of unexpected natural disasters, providing safe drinking water for the affected population following a disaster has become a global challenge of growing concern. An onsite water supply technology that is portable, mobile, or modular is a more suitable and sustainable solution for the victims than transporting bottled water. In recent years, various water techniques, such as membrane-assisted technologies, have been proposed and successfully implemented in many places. Given the diversity of techniques available, the current challenge is how to scientifically identify the optimum options for different disaster scenarios. Hence, a fuzzy triangular-based multi-criteria, group decision-making tool was developed in this research. The approach was then applied to the selection of the most appropriate water technologies corresponding to the different emergency water supply scenarios. The results show this tool capable of facilitating scientific analysis in the evaluation and selection of emergency water technologies for enduring security drinking water supply in disaster relief.

  19. Analysis And Assessment Of The Security Method Against Incidental Contamination In The Collective Water Supply System

    Directory of Open Access Journals (Sweden)

    Szpak Dawid

    2015-09-01

    Full Text Available The paper presents the main types of surface water incidental contaminations and the security method against incidental contamination in water sources. Analysis and assessment the collective water supply system (CWSS protection against incidental contamination was conducted. Failure Mode and Effects Analysis (FMEA was used. The FMEA method allow to use the product or process analysis, identification of weak points, and implementation the corrections and new solutions for eliminating the source of undesirable events. The developed methodology was shown in application case. It was found that the risk of water contamination in water-pipe network of the analyzed CWSS caused by water source incidental contamination is at controlled level.

  20. Swimming Safely (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-05-22

    In the summertime, families will be flocking to pools for relaxation and relief from the heat. A few simple precautions can help ensure a safe day in the water. In this podcast, Michele Hlavsa discusses ways to stay safe at the pool.  Created: 5/22/2014 by MMWR.   Date Released: 5/22/2014.

  1. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  2. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  3. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  4. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  5. Strategies for safe exploitation of fresh water through multi-strainer skimming wells in saline groundwater areas

    International Nuclear Information System (INIS)

    Alam, M.M.; Jaffery, H.M.; Hanif, M.

    2005-01-01

    Indus Basin of Pakistan to develop strategies for the safe exploitation of fresh upper groundwater layer through multi-strainer skimming wells in the areas having deeper saline groundwater. Results of detailed investigations are given in this paper. A methodology was designed for investigations and to study the movement of saline-fresh water interface. For this purpose deep observation wells were installed and water samples from various depths over a period of wells operational hours have been collected. Water quality of these samples was tested to evaluate the movement of saline-fresh water interface. Results indicated that there exists a relatively fresh water aquifer above the depth of 20m. Relatively impervious layer and clay lenses of variable thickness exists at various locations in the area. There is relatively less contribution from the lower aquifer as compared to the lateral movement of water to the well above the impervious layers. The skimming wells were operated for a different number of hours and water quality evaluated. The results show that the quality and quantity of the pumped groundwater can be improved with intermittent pumping for 4-6 hours per day under drought conditions and recovery of the water-table is quick. Moreover, the intermittent pumping maintained a minimum suction lift that helped get a relatively good discharge. Continuous long term pumping proved to be dangerous which can cause saline water intrusion. It is recommended to avoid long term pumping of skimming wells. Intermittent short hours operation can be helpful for safe exploitation of fresh water and make skimming well operation more cost effective. It is further added that 4-6 strainers make these skimming wells cost effective as compared to having a large number of strainers in a skimming well. (author)

  6. Sensor-enabled chem/bio contamination detection system dedicated to situational awareness of water distribution security status

    Science.gov (United States)

    Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.

    2010-04-01

    Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.

  7. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  8. 7 CFR 1780.14 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  9. The 21st Century Challenges and the Food-Energy-Water-Security (FEWS) Nexus in the Middle East Region

    Science.gov (United States)

    Moradkhani, H.; Hameed, M.

    2017-12-01

    Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.

  10. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  11. Does land tenure security matter for investment in soil and water conservation? Evidence from Kenya

    NARCIS (Netherlands)

    Kabubo-Mariara, J.; Linderhof, V.G.M.; Kruseman, G.

    2010-01-01

    This paper investigates the impact of tenure security and other factors on investment in soil and water conservation (SWC) in Kenya. Factor analysis, step-wise regression and reduced form model approaches are used to explain the willingness, likelihood and intensity of adoption of SWC investments.

  12. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  13. Water Resources: the Central Component of the WEF Nexus?

    Science.gov (United States)

    Ding, K.; Gunda, T.; Hornberger, G. M.

    2017-12-01

    Increasing population growth, consumption of natural resources, and deterioration of the environment coupled with climate change impacts (such as increased variability in precipitation) will challenge our abilities to provide water, energy and food (WEF) to the global populace. Less developed areas, such as the countries in Sub-Saharan Africa, are particularly vulnerable to such resource issues due to immature governance and management structures and strategies. We introduce an integrated approach to resource security analysis, which traditionally has focused on the WEF components separately and apply the methods to a suite of countries in Sub-Saharan Africa. Specifically, we evaluate the inter-connected nature of WEF securities by considering physical, demographic, socioeconomic, health, and institutional parameters related to each of the resource securities and by analyzing the relationships among the metrics. For example, reported food deficits for countries are strongly correlated with reported levels of access to safe drinking water. Multivariate statistical analyses are applied to identify relationships among resources and to develop indices that robustly and comprehensively capture the WEF nexus. Our results indicate that water plays the central role in the WEF nexus, due to its extensive use for both food and energy production in these countries. This approach provides a framework for analyzing the WEF nexus in other regions of the world.

  14. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  15. A simple security architecture for smart water management system

    CSIR Research Space (South Africa)

    Ntuli, N

    2016-05-01

    Full Text Available . Secure booting prevents installation of malicious code onto the device. By making sure that the booting process is secured, we can establish securely the root of trust for the device. Public key cryptography is utilized at this stage. During... Architecture 1168 Nonhlanhla Ntuli and Adnan Abu-Mahfouz / Procedia Computer Science 83 ( 2016 ) 1164 – 1169 3.2. Secure Communication While public key cryptography can be used in the first step (secure booting), it would be too heavy to use during...

  16. Between Soft Legality and Strong Legitimacy : A Political Economy Approach to the Struggle for Basic Entitlements to Safe Water and Sanitation

    NARCIS (Netherlands)

    de Gaay Fortman, B.|info:eu-repo/dai/nl/068346581; Marcatelli, M.

    2015-01-01

    This article argues that the internationally declared “human right to safe water and sanitation,” although characterized by soft legality, may yet support universal access to such basic entitlements by virtue of its strong legitimacy. From a strategic perspective, human rights do indeed provide

  17. Preliminary risk assessment of the Integral Inherently-Safe Light Water Reactor

    International Nuclear Information System (INIS)

    McCarroll, Kellen R.; Lee, John C.; Manera, Annalisa; Memmott, Matthew J.; Ferroni, Paolo

    2017-01-01

    The Integral, Inherently Safe Light Water Reactor (I 2 S-LWR) concept seeks to significantly increase nuclear power plant safety. The project implements a safety-by-design philosophy, eliminating several initiating events and providing novel, passive safety systems at the conceptual phase. Pursuit of unparalleled safety employs an integrated development process linking design with deterministic and probabilistic safety analyses. Unique aspects of the I 2 S-LWR concept and design process present challenges to the probabilistic risk assessment (PRA), particularly regarding overall flexibility, auditability and resolution of results. Useful approaches to initiating events and conditional failures are presented. To exemplify the risk-informed design process using PRA, a trade-off study of two safety system configurations is presented. Although further optimization is required, preliminary results indicate that the I 2 S-LWR can achieve a core damage frequency (CDF) from internal events less than 1.01 × 10 −8 /ry, including reactor vessel ruptures. Containment bypass frequency due to primary heat exchanger rupture is found to be comparable to non-vessel rupture CDF.

  18. Understanding the socio-institutional context to support adaptation for future water security in forest landscapes

    Directory of Open Access Journals (Sweden)

    Tahia Devisscher

    2016-12-01

    Full Text Available During the first half of the 21st century, socioeconomic development is expected to contribute faster and to a greater extent to global water stress than climate change. Consequently, we aimed to identify conditions that can facilitate local adaptation planning for future water security, accounting for the socio-institutional context, developmental needs, and interests affecting water use and management. Our study focused on three forest landscapes in Latin America where water stress was identified as a current concern potentially leading to future social conflict if not addressed. In the three sites, we adopted a participatory approach to implement a systematic diagnostic framework for the analysis of socio-institutional barriers and opportunities influencing local adaptation decision making. This novel application enabled science-society engagement in which civil society organizations were coleading the research. The field methods we used involved participatory social network mapping, semistructured interviews, and validation workshops. Our study generated insights into several interventions that could help overcome barriers affecting the adaptation decision-making process, particularly in the diagnosis and early planning phases. Points of intervention included fostering local participation and dialogue to facilitate coproduction of knowledge, and strengthening the role of key central actors in the water governance networks. These key actors are currently bridging multiple interests, information sources, and governance levels, and thus, they could become agents of change that facilitate local adaptation processes. Working jointly with civil society to frame the research proved effective to increase awareness about water issues, which related not only to the technological, economic, and political aspects of water, but also to organizational processes. The involvement of civil society created genuine interest in building further capacity for

  19. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  20. Bottled Water Everywhere: Keeping it Safe

    Science.gov (United States)

    ... that taps an aquifer—layers of porous rock, sand, and earth that contain water—which is under ... it to be labeled as “purified water.” Ensuring Quality and Safety Federal quality standards for bottled water ...

  1. [Comparative study of some clinical and laboratory indicators in a group of patients using wells as source of drinking water and a control group using safe water].

    Science.gov (United States)

    Vasilescu, L; Ciochină, D A

    2011-01-01

    In time, well water, as a source of drinking and coking water, with physical-chemical, bacteriological, and biological indicators suggestive of alteration in water potability, determines complex, sometimes irreversible, metabolic disorders. Sixty individuals residing in a rural community were divided into 2 groups: study group -30 subjects using well water, and control group--30 subjects using safe water. For the study group the selection criteria were: age, sex, use of well water as drinking and cooking water, history suggestive of chronic poisoning (pregnancy course, birth weight, susceptibility to infectious agents, and current chronic diseases). In the study group, gestosis, prematurity, and altered body mass index are more frequent as compared to the subjects in the control group. The identified laboratory changes indicate moderate anemia, hepatic cytolysis, dyslipidemia, presence of nitrites in urine, and positive urine cultures. Long-term use of water with mineral constituents in excess, absent, or inadequate, the direct biological and chemical water pollution, or most frequently the indirect pollution through the soil determine, in time, complex, sometimes irreversible, metabolic disorders.

  2. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  3. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  4. Impact of the safe drinking water act on energy development. Final issue paper

    International Nuclear Information System (INIS)

    Guymont, F.J.; Shore, R.; Goldberg, M.

    1977-11-01

    Energy development activities will be impacted by the Underground Injection Control Regulations that are formulated under Part C of the Safe Drinking Water Act. The thrust of Part C of the Act is to protect groundwater that now is or in the future might be used for drinking water. A new draft of the regulations, on which this analysis is based, is currently being considered. These regulations will be either another set of proposed regulations or will be interim final which means they can be enforced immediately but EPA will still entertain comments on them and modify them if necessary. There are four possible situations in which the Underground Control Regulations would not apply. They are: If the aquifer in question can be left unprotected despite the fact that its solids level is less than 10,000 mg/1; if the aquifer is oil or mineral producing; if the aquifer is located at a depth that would made recovery of drinking water uneconomical; and if the aquifer is already contaminated. However, the individual states have to demonstrate this to the satisfaction of the EPA administrator. If none of the conditions holds, construction, monitoring operating and reporting requirements will be necessary to receive a permit. The economic impact of these requirements is uncertain but could involve significant economic and time expenditures. Permits do not have to be renewed and one permit can serve for a whole field of wells. However, the permit application requires a significant amount of information and will take a considerable amount of time and expense to fill out. Solution mining operations also will incur extra expenses establishing initial water quality profiles and maintaining monitoring wells

  5. Does global progress on sanitation really lag behind water? An analysis of global progress on community- and household-level access to safe water and sanitation.

    Science.gov (United States)

    Cumming, Oliver; Elliott, Mark; Overbo, Alycia; Bartram, Jamie

    2014-01-01

    Safe drinking water and sanitation are important determinants of human health and wellbeing and have recently been declared human rights by the international community. Increased access to both were included in the Millennium Development Goals under a single dedicated target for 2015. This target was reached in 2010 for water but sanitation will fall short; however, there is an important difference in the benchmarks used for assessing global access. For drinking water the benchmark is community-level access whilst for sanitation it is household-level access, so a pit latrine shared between households does not count toward the Millennium Development Goal (MDG) target. We estimated global progress for water and sanitation under two scenarios: with equivalent household- and community-level benchmarks. Our results demonstrate that the "sanitation deficit" is apparent only when household-level sanitation access is contrasted with community-level water access. When equivalent benchmarks are used for water and sanitation, the global deficit is as great for water as it is for sanitation, and sanitation progress in the MDG-period (1990-2015) outstrips that in water. As both drinking water and sanitation access yield greater benefits at the household-level than at the community-level, we conclude that any post-2015 goals should consider a household-level benchmark for both.

  6. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    Malawi is popularly known as the Warm Heart of Africa. Malawi has a total land area of 45,747 sq. miles. Of the total area, 80 % is covered by fresh water from Lake Malawi and other rivers. The country boasts that it holds large amounts of fresh water and has the third largest lake in Africa. Ironically, the number of households with reliable water access is low (Water Aid, 2014, UNDP, Human Development Report 2008). Regardless of signs of economic development, water security still remains a challenge in the Warm Heart of Africa. The problem with access to water prompted the Government of Malawi to introduce a National Water Policy in 1994 with the vision of 'Water and Sanitation for All'. Since then, other water access interventions have impacted on the ability to manage water sustainably. Over the past few years, more inclusive and diversified interventions have been put in place to reverse the situation. For instance, the government of Malawi has taken action to increase the number of water tanks in schools (UNICEF 2005). Several stakeholders' support the government in their role provides policy direction and coordinate management of the water sector. The outlined National Water and Sanitation Policy strategies includes promoting water conservation and catchment protection; incorporating local governments and communities in planning, development and management of water supplies and sanitation services; rehabilitating the existing infrastructure; creating an enabling environment for public-private partnerships in water supply and sanitation activities; undertaking rehabilitation and reduction of unaccounted-for-water of existing urban, peri-urban, as a priority; promoting economic incentives and opportunities to encourage the participation of small-scale water and sanitation service providers; and promoting water recycling and re-use. Despite of all these interventions, Malawi still continues to face significant challenges with issues of access and quality of

  7. Peaceful nuclear development and the three 'S' ('Safety', 'Security' and 'Safeguards')

    International Nuclear Information System (INIS)

    Julio Gonzalez, Abel; Abel Gonzalez, Martin

    2010-01-01

    We should agree on a comprehensive solution for a commensurate international control of both nuclear and radioactive material designed to ensure that peaceful nuclear developments will not cause harm to humanity. The concept of an international security system is clouded by the confusing semantics of its parts: the English concepts 'safeguards', 'safety' and 'security', on one hand, and nuclear and radioactive materials on the other hand. The objectives should be: to ensure, through appropriate safeguards, that nuclear materials are not diverted to non-peaceful activities; to prevent, through appropriate security, the unauthorized possession or use, illegal or malicious, of nuclear and radioactive materials; and, to ensure, through appropriate safety, that the use of nuclear and radioactive material will not cause harm to people and the environment. Security must be understood as an integral part of safeguards and safety, because materials that are secure are not necessarily safeguarded or safe, and materials may not be safeguarded or safe unless they are secure. Security is a necessary but not sufficient condition for safeguards and safety; security is an important but subsidiary condition of safeguards and safety; security is necessary but not sufficient to ensure nuclear control via safeguards and safety. In conclusion an International Treaty for the Control ('safeguards', 'safety' and 'security') of the Peaceful Development of Nuclear Energy and its Byproducts is proposed. It should clearly regulate the obligations and (non-compliance) penalties of the Parties, and, based on existing agreements, should be clear, logical, rational, fundamental, methodical, systematic, universal, equitable, impartial, fair and non discriminatory. (author)

  8. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  9. Simulation of cloud data security processes and performance

    OpenAIRE

    Chand, K; Ramachandran, M; Kor, AL

    2015-01-01

    In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security ...

  10. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  11. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  12. Something in the Water: Hospital Responds to Water Crisis.

    Science.gov (United States)

    Redfern, Roberta; Micham, Jennifer; Daniels, Rebecca; Childers, Sue

    2018-02-05

    Early on August 2, 2014, in the city of Toledo, Ohio, a media alert informed the public that traces of microcystin, a hazardous toxin, had been detected in the drinking water. The warning stated that residents should not drink, boil, or even touch the contaminated water. A water crisis of this magnitude was recognized to pose a potentially serious and significant impact on patient care and safety in health care environments. ProMedica Toledo Hospital's Emergency Operation Plan addressed 3 critical issues: safe water availability, alternate cleaning solutions, and preparations for a prolonged crisis. This report details some of the lessons learned throughout the response to the crisis: particularly, because the impact was county-wide which affected other hospitals who used the same vendors, alternate water sources should have been secured in advance; the courier service was vital to delivery of supplies and moving equipment to alternate areas for sterilization processes; and finally, communication with staff and patients was jeopardized by external media outlets. Changes to the emergency plan considering these unanticipated aspects proved useful in a later incident and should be considered by all health care facilities as water emergency policies and procedures are created and reviewed. (Disaster Med Public Health Preparedness. 2018;page 1 of 3).

  13. Characterizing Natural Gas Hydrates in the Deep Water Gulf of Mexico: Applications for Safe Exploration and Production Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bent, Jimmy

    2014-05-31

    In 2000 Chevron began a project to learn how to characterize the natural gas hydrate deposits in the deep water portion of the Gulf of Mexico (GOM). Chevron is an active explorer and operator in the Gulf of Mexico and is aware that natural gas hydrates need to be understood to operate safely in deep water. In August 2000 Chevron worked closely with the National Energy Technology Laboratory (NETL) of the United States Department of Energy (DOE) and held a workshop in Houston, Texas to define issues concerning the characterization of natural gas hydrate deposits. Specifically, the workshop was meant to clearly show where research, the development of new technologies, and new information sources would be of benefit to the DOE and to the oil and gas industry in defining issues and solving gas hydrate problems in deep water.

  14. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions ...

  15. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  16. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Center. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour training aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  17. Towards intrinsically safe light-water reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1983-02-01

    The reactor-safety issue is one of the principal problems threatening the future of the nuclear option, at least in participatory democracies. It has contributed to widespread public distrust and is the direct cause of the escalation in design complexity and quality assurance requirements that are rapidly eroding the competitive advantage of nuclear power. Redesign of the light-water reactor can eliminate those features that leave it open to public distrust and obstructive intervention. This redesign appears feasible within the realm of proven technology in those fields (fuels, materials, water chemistry, waste technology, etc.) in which extended operating experience is essential for confidence in system performance. A pressurized water reactor outline design developed to achieve the above goal is presented. The key feature is the design of the primary system extracting heat from the core so that the latter is protected from damage caused by any credible system failure or any destructive intervention from the outside by either violent means (up to and including nonnuclear warfare) or by mistaken or malicious use of the plant control systems. Such a design objective can be achieved by placing the entire primary circulation system in a large pressurized pool of cold water with a high boric acid content. Enough water is provided in the pool to allow core-decay-heat removal by evaporation for at least one week following any incident with no cooling systems operating. Subsequently it is assumed that a supply of further water (a few cubic meters per hour) from the outside can be arranged, even without the presence of the plant operating personnel

  18. Water Security Toolkit User Manual Version 1.2.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William Eugene; Phillips, Cynthia Ann; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  19. Safe water: an enquiry into water entitlements and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence

  20. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  1. Radiocarbon ages of ground water as a basis for the determination of safe limits of aquifer exploitation

    International Nuclear Information System (INIS)

    Tamers, M.A.; Stipp, J.J.; Weiner, R.

    1975-01-01

    Deep ground waters of the Biscayne aquifer of south Florida were studied with radiocarbon dating techniques. Dissolved carbonates served as the material for the age determinations. Limestone dilution corrections of the measured carbon-14 activities were made by comparison of the relative concentrations of bicarbonate and total carbonates. The deep well waters of the southern portion of the deposit have corrected radiocarbon contents indicating thermonuclear weapon testing contamination; they are, therefore, less than 20 years old. The ages of the ground waters generally increase in the northern direction. This is interpreted as due to the greater depth of the deposit of that region. A model is formulated for ground water movement in an unconfined producing hydrological unit and applied to the radiocarbon results of the most intensively exploited zone of the Biscayne aquifer. It is shown that the water which is extracted by the municipal wells in this area is limited to the bottom third of the deposit. The avoidance of pollution from the surrounding septic tanks in the shallower depths of the area is explained in this way. The model leads to an objective estimation of the safe limit for the ground water extraction rate in the zone. By application of radiocarbon dating, it is possible to obtain useful information without disturbing the water supply

  2. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  3. Impact of Climate and Land Use Changes on Water and Food Security in Jordan: Implications for Transcending “The Tragedy of the Commons”

    Directory of Open Access Journals (Sweden)

    Jawad Taleb Al-Bakri

    2013-02-01

    Full Text Available This study investigates the impact of climate change and land use change on water resources and food security in Jordan. The country is dominated by arid climate with limited arable land and water resources, where the per capita share of water is less than 145 m3/year. The study focused on crop production and water resources under trends of anticipated climate change and population growth in the country. Remote sensing data were used to determine land use/cover changes and rates of urbanization, which took place at the cost of the cultivable land. Recession of irrigated areas led to lesser food production and food security. Outputs from crop production and water requirements models, in addition to regression analysis, were used to estimate the projected increase in agricultural water demand under the scenarios of increased air temperature and reduced rainfall by the years 2030 and 2050. Results indicated that problems of water scarcity and food insecurity would be exacerbated by climate change and increased population growth. To move from the tragedy of the commons towards transcendence, the study emphasized the need for adaptive measures to reduce the impacts of climate change on water resources and food security. The challenge, however, would remain the development and the efficient use of new water resources as a means for future sustainable development.

  4. Ensuring the security and availability of a hospital wireless LAN system.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  5. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  6. Premiering SAFE for Safety Added Fuel Element - 15020

    International Nuclear Information System (INIS)

    Bhowmik, P.K.; Shamim, J.A.; Suh, K.Y.; Suh, K.S.

    2015-01-01

    The impact of the Fukushima accident has been the willingness to implement passive safety measures in reactor design and to simplify reactor design itself. Within this framework, a new fuel element, named SAFE (Safety Added Fuel Element) based on the concept of accident tolerant fuel, is presented. SAFE is a new type of fuel element cooled internally and externally by light water and with stainless steel as the cladding material. The removal of boron may trigger a series of changes which may simplify the system greatly. A simplified thermal analysis of SAFE shows that the fuel centerline temperature is well below the maximal limit during the normal operation of the plant

  7. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    Science.gov (United States)

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  8. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  9. Comparative Assessment of Physical and Social Determinants of Water Quantity and Water Quality Concerns

    Science.gov (United States)

    Gunda, T.; Hornberger, G. M.

    2017-12-01

    Concerns over water resources have evolved over time, from physical availability to economic access and recently, to a more comprehensive study of "water security," which is inherently interdisciplinary because a secure water system is influenced by and affects both physical and social components. The concept of water security carries connotations of both an adequate supply of water as well as water that meets certain quality standards. Although the term "water security" has many interpretations in the literature, the research field has not yet developed a synthetic analysis of water security as both a quantity (availability) and quality (contamination) issue. Using qualitative comparative and multi-regression analyses, we evaluate the primary physical and social factors influencing U.S. states' water security from a quantity perspective and from a quality perspective. Water system characteristics are collated from academic and government sources and include access/use, governance, and sociodemographic, and ecosystem metrics. Our analysis indicates differences in variables driving availability and contamination concerns; for example, climate is a more significant determinant in water quantity-based security analyses than in water quality-based security analyses. We will also discuss coevolution of system traits and the merits of constructing a robust water security index based on the relative importance of metrics from our analyses. These insights will improve understanding of the complex interactions between quantity and quality aspects and thus, overall security of water systems.

  10. Economics of place-based monitoring under the safe drinking water act, part II: design and development of place-based monitoring strategies.

    Science.gov (United States)

    Brands, Edwin; Rajagopal, R

    2008-08-01

    The goals of environmental legislation and associated regulations are to protect public health, natural resources, and ecosystems. In this context, monitoring programs should provide timely and relevant information so that the regulatory community can implement legislation in a cost-effective and efficient manner. The Safe Drinking Water Act (SDWA) of 1974 attempts to ensure that public water systems (PWSs) supply safe water to its consumers. As is the case with many other federal environmental statutes, SDWA monitoring has been implemented in relatively uniform fashion across the United States. In this three part series, spatial and temporal patterns in water quality data are utilized to develop, compare, and evaluate the economic performance of alternative place-based monitoring approaches to current monitoring practice. Part II: Several factors affect the performance of monitoring strategies, including: measurable objectives, required precision in estimates, acceptable confidence levels of such estimates, available budget for sampling. In this paper, we develop place-based monitoring strategies based on extensive analysis of available historical water quality data (1960-1994) of 19 Iowa community water systems. These systems supply potable water to over 350,000 people. In the context of drinking water, the objective is to protect public health by utilizing monitoring resources to characterize contaminants that are detectable, and are close to exceeding health standards. A place-based monitoring strategy was developed in which contaminants were selected based on their historical occurrence, rather than their appearance on the SDWA contaminant list. In a subset of the water systems, the temporal frequency of monitoring for one ubiquitous contaminant, nitrate, was tailored to patterns in its historical occurrence and concentration. Three sampling allocation models (linear, quadratic, and cubic) based on historic patterns in peak occurrence were developed and

  11. Managing the safe mobility of older road users: How to cope with their diversity?

    DEFF Research Database (Denmark)

    Haustein, Sonja; Marin-Lamellet, Claude

    2014-01-01

    Against the background of an ageing population, the management of older people's safe mobility is becoming an increasingly important issue. Mobility is vital for older people's quality of life and several examples of good practice that support older people's safe mobility already exist. However...... groups who are already users and improve their (safe) use of the preferred transport mode. However, they do not seem to succeed in increasing mobility options, e.g. by encouraging car-reliant users to cycle or use public transport or by helping older women to continue to drive. We advise that existing...... systems, a lack of programmes to increase perceived security, as well as a comprehensive scheme for older drivers who have to stop driving....

  12. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  13. Dynamic operator actions analysis for inherently safe fast reactors and light water reactors

    International Nuclear Information System (INIS)

    Ho, V.; Apostolakis, G.

    1988-01-01

    A comparative dynamic human actions analysis of inherently safe fast reactors (ISFRs) and light water reactors (LWRs) in terms of systems response and estimated human error rates is presented. Brief overviews of the ISFR and LWR systems are given to illustrate the design differences. Key operator actions required by the ISFR reactor shutdown and decay heat removal systems are identified and are compared with those of the LWR. It is observed that, because of the passive nature of the ISFR safety-related systems, a large time window is available for operator actions during transient events. Furthermore, these actions are fewer in number, are less complex, and have lower error rates and less severe consequences than those of the LWRs. We expect the ISFR operator errors' contribution to risk is smaller (at least in the context of the existing human reliability models) than that of the LWRs. (author)

  14. Status of the advanced boiling water reactor and simplified boiling water reactor

    International Nuclear Information System (INIS)

    Smith, P.F.

    1992-01-01

    This paper reports that the excess of U.S. electrical generating capacity which has existed for the past 15 years is coming to an end as we enter the 1990s. Environmental and energy security issues associated with fossil fuels are kindling renewed interest in the nuclear option. The importance of these issues are underscored by the National Energy Strategy (NES) which calls for actions which are designed to ensure that the nuclear power option is available to utilities. Utilities, utility associations, and nuclear suppliers, under the leadership of the Nuclear Power Oversight Committee (NPOC), have jointly developed a 14 point strategic plan aimed at establishing a predictable regulatory environment, standardized and pre-licensed Advanced Light Water Reactor (ALWR) nuclear plants, resolving the long-term waste management issue, and other enabling conditions. GE is participating in this national effort and GE's family of advanced nuclear power plants feature two new reactor designs, developed on a common technology base, aimed at providing a new generation of nuclear plants to provide safe, clean, economical electricity to the world's utilities in the 1990s and beyond. Together, the large-size (1300 MWe) Advanced Boiling Water Reactor (ABWR) and the small-size (600 MWe) Simplified Boiling Water Reactor (SBWR) are innovative, near-term candidates for expanding electrical generating capacity in the U.S. and worldwide. Both possess the features necessary to do so safely, reliably, and economically

  15. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  16. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  17. CSIR eNews: Defence peace safety and security

    CSIR Research Space (South Africa)

    CSIR

    2008-03-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  18. CSIR eNews: Defence, peace, safety and security

    CSIR Research Space (South Africa)

    CSIR

    2007-12-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  19. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  20. Re-designing the PhEDEx security model

    International Nuclear Information System (INIS)

    Huang C-H; Wildish, T; Zhang X

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  1. Water Security, Climate Forcings and Public Health Impacts in Emerging Regions

    Science.gov (United States)

    Serman, E. A.; Akanda, A. S.; Craver, V.; Boving, T. B.

    2014-12-01

    Our world is rapidly urbanizing, with more than 80% of world's population is expected to be living in a city by the end of the century. A majority of these nations are rapidly urbanizing due to massive rural-to-urban migratory trends, with rapid development of unplanned urban settlements, or slums, with lack of adequate water or sanitation facilities and other municipal amenities. With global environmental change, natural disasters will expose millions more to drought, floods, and disease epidemics, and existing vulnerabilities will worsen. At the same time, rapid urbanization and fast changing land-use leads to widespread damage of infrastructure by stormwater, especially in lowlands and economically poor areas. The factor that consistently stands out among different cities from both the developed and the developing worlds is that the slums are typically the most vulnerable to water related natural hazards and climatic threats, such as water scarcity and quality issues in drought conditions, or water and sanitation breakdown and stormwater contamination problems. Onsite or decentralized water, wastewater and stormwater treatment as well as point-of-use water treatment options can be an economic, safe, and reliable alternative to conventional large-scale treatment especially, in urban fringes as well as rural areas. These systems can be designed to fit communities in terms of their economic, cultural, environmental, and demographic resources. As part of this study, we develop a database of urban water quality and quantity indices such as with urban land-use, water usage, climate, and socio-economic characteristics in various emerging regions in the world. We analyze past and current data to identify and quantify long-term trends and the impacts of large-scale climatic and anthropogenic changes on urban hydrology and health impacts. We specifically focus on five major cities from distinct groups of countries and geographies: Providence, RI, USA from the developed

  2. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  3. Closing the water cycle - the key role of water and wastewater management in a circular economy

    Science.gov (United States)

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  4. Assessing food security in water scarce regions by Life Cycle Analysis: a case study in the Gaza strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni

    2013-04-01

    Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).

  5. 76 FR 30495 - National Safe Boating Week, 2011

    Science.gov (United States)

    2011-05-25

    ... precautions and sensible behavior when spending time on the water. Safe boating is responsible boating. Individuals can prepare for excursions by taking boating safety courses and filing float plans with family...

  6. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  7. Food security, irrigation, climate change, and water scarcity in India

    Science.gov (United States)

    Hertel, T. W.; Taheripour, F.; Gopalakrishnan, B. N.; Sahin, S.; Escurra, J.

    2015-12-01

    annual reductions in welfare will be about 24.3 billion for 2008 to 2030. This study highlights the importance of considering the interplay between climate and water availability in assessments of food security.

  8. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  9. Lessons Learned From Developing a Sustainable Arsenic-Safe Water Program in West Bengal, India Over a Period of Eight Years

    Science.gov (United States)

    Smith, M. M.; Liaw, J.; Hira, A.; Guha, P.; Pal, S. S.; Hore, T.; Smith, A. H.

    2010-12-01

    Arsenic is a carcinogen, and causes many cancers and noncancer diseases. Recent findings have shown that exposure to arsenic in drinking water as a child or before birth can cause illness and death even as an adult. In the West Bengal region of India, more than six million people are drinking crystal clear but arsenic-contaminated water from tubewells. Project Well, a non-profit organization based in California, has provided safe drinking water to villages in West Bengal since 2001 through modern modified dugwells, currently numbering 163. Along the way, Project Well has faced the challenge of persuading people to stop consuming good-tasting, arsenic-laced water and instead drink chlorinated water, which is safe but may have the smell of chlorine. Additionally, West Bengal receives abundant annual rainfall, and hence it is difficult to convince people to pay for treated water. From its inception, the Project Well program was set up with a tracking system to assess the efficacy of the modern dugwells, which has helped identify where technical improvements were needed. Continuous interaction with community-based user groups has also helped overcome many constraints and make the program sustainable. Project Well monitoring records from August 2010 show that out of 163 modern dugwells, 48 percent were being used, providing water for 2948 villagers; 23 percent were closed; 6 percent were dry (11 districts of West Bengal were in a drought); 6 percent required maintenance; and 7 percent were not used. Arsenic concentrations in the modern dugwells were measured every year during peak season when the water table was low and the median arsenic concentration of operational dugwells over the eight years between 2002 and 2010 was 15 ppb (the permissible limit in India is 50 ppb). Each year, about 6 to 10 percent of the dugwells have arsenic levels above 50 ppb during the summer season, when the water level is low. Bacterial counts, i.e., total coliform and fecal coliform, are

  10. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  11. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    Science.gov (United States)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  12. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  13. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  14. Impacts of multiple global environmental changes on African crop yield and water use efficiency: Implications to food and water security

    Science.gov (United States)

    Pan, S.; Yang, J.; Zhang, J.; Xu, R.; Dangal, S. R. S.; Zhang, B.; Tian, H.

    2016-12-01

    Africa is one of the most vulnerable regions in the world to climate change and climate variability. Much concern has been raised about the impacts of climate and other environmental factors on water resource and food security through the climate-water-food nexus. Understanding the responses of crop yield and water use efficiency to environmental changes is particularly important because Africa is well known for widespread poverty, slow economic growth and agricultural systems particularly sensitive to frequent and persistent droughts. However, the lack of integrated understanding has limited our ability to quantify and predict the potential of Africa's agricultural sustainability and freshwater supply, and to better manage the system for meeting an increasing food demand in a way that is socially and environmentally or ecologically sustainable. By using the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed the spatial and temporal patterns of crop yield, evapotranspiration (ET) and water use efficiency across entire Africa in the past 35 years (1980-2015) and the rest of the 21st century (2016-2099). Our preliminary results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion (about 50%), elevated atmospheric CO2 concentration, and nitrogen deposition. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Climate extremes especially droughts and heat wave have largely reduced crop yield in the most vulnerable regions. Our results indicate that N fertilizer could be a major driver to improve food security in Africa. Future climate warming could reduce crop yield and shift cropland distribution. Our study further suggests that improving water use efficiency through land

  15. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    International Nuclear Information System (INIS)

    Thomas, L.L.; Strait, R.S.

    1994-10-01

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient

  16. MINING SECURITY PIPE© (TSM© WITH UNDERGROUND GPS GLOBAL© (RSPG© ESCAPE SECURITY DEVICE IN UNDERGROUND MINING

    Directory of Open Access Journals (Sweden)

    Rafael Barrionuevo GIMÉNEZ

    2016-04-01

    Full Text Available TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly. TSM is light and hand able pipe made with aramid (Kevlar, carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.. The open hardware and software like Arduino will be the heart of control and automation system.

  17. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    The 336,000 km2 Saskatchewan River Basin (SaskRB) in Western Canada illustrates many of the issues of Water Security faced world-wide. It poses globally-important science challenges due to the diversity in its hydro-climate and ecological zones. With one of the world's more extreme climates, it embodies environments of global significance, including the Rocky Mountains (source of the major rivers in Western Canada), the Boreal Forest (representing 30% of Canada's land area) and the Prairies (home to 80% of Canada's agriculture). Management concerns include: provision of water resources to more than three million inhabitants, including indigenous communities; balancing competing needs for water between different uses, such as urban centres, industry, agriculture, hydropower and environmental flows; issues of water allocation between upstream and downstream users in the three prairie provinces; managing the risks of flood and droughts; and assessing water quality impacts of discharges from major cities and intensive agricultural production. Superimposed on these issues is the need to understand and manage uncertain water futures, including effects of economic growth and environmental change, in a highly fragmented water governance environment. Key science questions focus on understanding and predicting the effects of land and water management and environmental change on water quantity and quality. To address the science challenges, observational data are necessary across multiple scales. This requires focussed research at intensively monitored sites and small watersheds to improve process understanding and fine-scale models. To understand large-scale effects on river flows and quality, land-atmosphere feedbacks, and regional climate, integrated monitoring, modelling and analysis is needed at large basin scale. And to support water management, new tools are needed for operational management and scenario-based planning that can be implemented across multiple scales and

  18. 76 FR 48751 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-08-09

    ... Jardine Water Filtration Plant security zone would encompass all U.S. navigable waters of Lake Michigan... areas near shore to Chicago's water filtration plants; the security zones have been designed to allow.... 165.910 Security Zones; Captain of the Port Lake Michigan. (a) * * * (1) Jardine Water Filtration...

  19. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  20. Is fasting safe? A chart review of adverse events during medically supervised, water-only fasting.

    Science.gov (United States)

    Finnell, John S; Saul, Bradley C; Goldhamer, Alan C; Myers, Toshia R

    2018-02-20

    Evidence suggests that fasting, during which only water is consumed, results in potentially health promoting physiological effects. However, peer-reviewed research assessing the safety of water-only fasting is lacking. To address this, we conducted a chart review to describe adverse events (AEs) that occurred during medically supervised, water-only fasting. Electronic charts from patient visits to a residential medical facility from 2006 to 2011 were reviewed. Patients who were at least 21 years of age and water-only fasted for ≥2 consecutive days with a refeeding period equal to half of the fast length were included. Out of 2539 charts, 768 visits met our inclusion and exclusion criteria. AEs were abstracted from chart notes and classified according to CTCAE (v4.03) and MedDRA (v12.1) terminology. Descriptive analysis of AEs is reported. During the protocol period, the highest grade AE (HGAE) in 555 visits was a grade 2 event or lower, in 212 visits it was a grade 3 event, in 1 visit it was a grade 4 event, and there were no grade 5 events. There were 2 (0.002%) visits with a serious adverse event (SAE). The majority of AEs identified were mild (n = 4490, 75%) in nature and known reactions to fasting. To our knowledge, this is the most comprehensive analysis of AEs experienced during medically supervised, water-only fasting conducted to date. Overall, our data indicate that the majority of AEs experienced were mild to moderate and known reactions to fasting. This suggests that the protocol used in this study can be safely implemented in a medical setting with minimal risk of a SAE.

  1. Health impact of supplying safe drinking water containing fluoride below permissible level on flourosis patients in a fluoride-endemic rural area of West Bengal.

    Science.gov (United States)

    Majumdar, Kunal Kanti

    2011-01-01

    The problem of high fluoride concentration in groundwater resources has become one of the most important toxicological and geo-environmental issues in India. Excessive fluoride in drinking water causes dental and skeletal fluorosis, which is encountered in endemic proportions in several parts of the world. World Health Organization (WHO) guideline value and the permissible limit of fluoride as per Bureau of Indian Standard (BIS) is 1.5 mg/L. About 20 states of India, including 43 blocks of seven districts of West Bengal, were identified as endemic for fluorosis and about 66 million people in these regions are at risk of fluoride contamination. Studies showed that withdrawal of sources identified for fluoride often leads reduction of fluoride in the body fluids (re-testing urine and serum after a week or 10 days) and results in the disappearance of non-skeletal fluorosis within a short duration of 10-15 days. To determine the prevalence of signs and symptoms of suspected dental, skeletal, and non-skeletal fluorosis, along with food habits, addictions, and use of fluoride containing toothpaste among participants taking water with fluoride concentration above the permissible limit, and to assess the changes in clinical manifestations of the above participants after they started consuming safe drinking water. A longitudinal intervention study was conducted in three villages in Rampurhat Block I of Birbhum district of West Bengal to assess the occurrence of various dental, skeletal, and non-skeletal manifestations of fluorosis, along with food habits, addictions, and use of fluoride containing toothpaste among the study population and the impact of taking safe water from the supplied domestic and community filters on these clinical manifestations. The impact was studied by follow-up examination of the participants for 5 months to determine the changes in clinical manifestations of the above participants after they started consuming safe drinking water from supplied

  2. Position of the academy of nutrition and dietetics: nutrition security in developing nations: sustainable food, water, and health.

    Science.gov (United States)

    Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M

    2013-04-01

    It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts. Copyright © 2013 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  3. 33 CFR 106.140 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...

  4. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  5. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  6. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...

  7. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  8. The journey from safe yield to sustainability.

    Science.gov (United States)

    Alley, William M; Leake, Stanley A

    2004-01-01

    Safe-yield concepts historically focused attention on the economic and legal aspects of ground water development. Sustainability concerns have brought environmental aspects more to the forefront and have resulted in a more integrated outlook. Water resources sustainability is not a purely scientific concept, but rather a perspective that can frame scientific analysis. The evolving concept of sustainability presents a challenge to hydrologists to translate complex, and sometimes vague, socioeconomic and political questions into technical questions that can be quantified systematically. Hydrologists can contribute to sustainable water resources management by presenting the longer-term implications of ground water development as an integral part of their analyses.

  9. Risk management for assuring safe drinking water.

    OpenAIRE

    Hrudey, Steve E.; Hrudey, Elizabeth J.; Pollard, Simon J. T.

    2006-01-01

    Millions of people die every year around the world from diarrheal diseases much of which is caused by contaminated drinking water. By contrast, drinking water safety is largely taken for granted by many citizens of affluent nations. The ability to drink water that is delivered into households without fear of becoming ill may be one of the key defining characteristics of developed nations in relation to the majority of the world. Yet there is well-documented evidence that dis...

  10. Developing an environmentally appropriate, socially acceptable and gender-sensitive technology for safe-water supply to households in arsenic affected areas in rural Bangladesh

    NARCIS (Netherlands)

    Amin, N.

    2010-01-01

    To confront the arsenic crisis in Bangladesh, several options for a safe water supply in the rural As-affected areas are available. Most of these options have shown a minimum scope to mitigate arsenic-related risks because of their poor performance and non-acceptability by the rural households. In

  11. Safe drinking water production in rural areas: a comparison between developed and less developed countries.

    Science.gov (United States)

    Cotruvo, J A; Trevant, C

    2000-01-01

    At the fundamental level, there are remarkable parallels between developed and less developed countries in problems of providing safe drinking water in rural areas, but of course, they differ greatly in degree and in the opportunities for resolution. Small water supplies frequently encounter difficulty accessing sufficient quantities of drinking water for all domestic uses. If the water must be treated for safety reasons, then treatment facilities and trained operating personnel and finances are always in short supply. Ideally, each solution should be sustainable within its own cultural, political and economic context, and preferably with local personnel and financial resources. Otherwise, the water supply will be continuously dependent on outside resources and thus will not be able to control its destiny, and its future will be questionable. The history of success in this regard has been inconsistent, particularly in less developed but also in some developed countries. The traditional and ideal solution in developing countries has been central water treatment and a piped distribution network, however, results have had a mixed history primarily due to high initial costs and operation and maintenance, inadequate access to training, management and finance sufficient to support a fairly complex system for the long term. These complete systems are also slow to be implemented so waterborne disease continues in the interim. Thus, non-traditional, creative, cost-effective practical solutions that can be more rapidly implemented are needed. Some of these options could involve: small package central treatment coupled with non piped distribution, e.g. community supplied bottled water; decentralized treatment for the home using basic filtration and/or disinfection; higher levels of technology to deal with chemical contaminants e.g. natural fluoride or arsenic. These technological options coupled with training, technical support and other essential elements like community

  12. Inherently safe in situ uranium recovery

    International Nuclear Information System (INIS)

    Krumhansl, James Lee; Beauheim, Richard Louis; Brady, Patrick Vane; Arnold, Bill Walter; Kanney, Joseph F.; McKenna, Sean Andrew

    2009-01-01

    Expansion of uranium mining in the United States is a concern to some environmental groups and sovereign Native American Nations. An approach which may alleviate some problems is to develop inherently safe in situ uranium recovery ('ISR') technologies. Current ISR technology relies on chemical extraction of trace levels of uranium from aquifers that, once mined, can still contain dissolved uranium and other trace metals that are a health concern. Existing ISR operations are few in number; however, high uranium prices are driving the industry to consider expanding operations nation-wide. Environmental concerns and enforcement of the new 30 ppb uranium drinking water standard may make opening new mining operations more difficult and costly. Here we propose a technological fix: the development of inherently safe in situ recovery (ISISR) methods. The four central features of an ISISR approach are: (1) New 'green' leachants that break down predictably in the subsurface, leaving uranium, and associated trace metals, in an immobile form; (2) Post-leachant uranium/metals-immobilizing washes that provide a backup decontamination process; (3) An optimized well-field design that increases uranium recovery efficiency and minimizes excursions of contaminated water; and (4) A combined hydrologic/geochemical protocol for designing low-cost post-extraction long-term monitoring. ISISR would bring larger amounts of uranium to the surface, leave fewer toxic metals in the aquifer, and cost less to monitor safely - thus providing a 'win-win-win' solution to all stakeholders.

  13. Achieving water security through community-based agreements in rural Northwestern Costa Rica

    Science.gov (United States)

    Bautista Solís, P.; Bommel, P.; Campos, X.; Suarez, A.; Leclerc, G.

    2016-12-01

    Community-based drinking water organizations have the responsibility in supplying water for domestic use to 29% of the Costa Rican population. Nowadays, more than 1.500 of these organizations face important challenges for achieving this critical mission, such as fulfilling national drinking-water quality standards, and improving their organization and administration to secure water supply and distribution under climate change. We conducted action-research in two communities with similar geographical and demographic conditions: Cuajiniquil and Colas de Gallo located in the drought prone Guanacaste region in Costa Rica. Both communities are contrasted regarding to their assets and organization. We addressed the following research question: Can a participatory process help communities assess the situation of their aqueduct and its management, project themselves in the future, and build more resilient strategies to face domestic water restrictions? Through 16 participatory sessions, we adapted the Wat-a-Game (WAG) toolkit to the problem of domestic water provision in these communities, creating the WAG-Tico role-playing game. This was complemented by two other activities: visits by regional actors sharing their experience, and exchange visits between both communities for cross-learning about community-based water management. The process resulted in a locally-led collaboration between both communities and the emergence of community commitments for improving drought resilience. WAG-Tico sensibilized participants to appreciate the value of community organization and the impacts of climate change on water supply, and develop aqueduct management rules. Exchange visits and regional actors interventions promoted opportunities for accessing to external resources (i.e. social, human and financial). Colas de Gallo created its first water committee for building a community aqueduct and their first drilled well. Cuajiniquil has committed in protecting its water springs, organized

  14. Global opportunities in land and water use while staying within the safe (and just) operating space: quantifications of interactions and tradeoffs

    Science.gov (United States)

    Gerten, Dieter; Jägermeyr, Jonas; Heck, Vera

    2016-04-01

    Staying within the safe and just operating space as defined by multiple planetary boundaries will be a major challenge especially in view of anticipated future increases in food demand, the potential need for balancing climate change (e.g. through terrestrial carbon dioxide removal) and its impacts, and the water and land demand associated with these goals and measures. This presentation will show simulation results from a comprehensive model-based study on the global potentials of diverse crop management options considered as opportunities to stay within the planetary boundaries for human freshwater use and land-system change. The quantified on-farm options include rainwater harvesting, soil conservation and more efficient irrigation, all of which are designed to use neither more water nor more land for agriculture than is presently the case. Results show that irrigation efficiency improvements could save substantial amounts of water in many river basins (globally 48% of non-productive water consumption in an ambitious scenario), and if rerouted to irrigate neighbouring rainfed systems, could at the same time boost kilocalorie production by 26% globally. Low-tech solutions for small-scale farmers on water-limited croplands show the potential to increase rainfed yields to a similar extent. In combination, such ambitious yet achievable integrated water management strategies could increase global kcal production by 41% and close the water-related yield gap by 62%. Global climate change would have adverse effects on crop yields in many regions, but the improvements in water management quantified here could buffer such effects to a significant degree. Thus, a substantial amount of anticipated future needs for food production could be fulfilled without further approaching / transgressing planetary boundaries. In addition, it will be shown how large-scale biomass plantations for the purpose of terrestrial CO2 removal (climate engineering, potentially implemented should

  15. Irrigation water as a source of drinking water: is safe use possible?

    DEFF Research Database (Denmark)

    Hoek, Wim van der; Konradsen, F; Ensink, J H

    2001-01-01

    BACKGROUND: In arid and semi-arid countries there are often large areas where groundwater is brackish and where people have to obtain water from irrigation canals for all uses, including domestic ones. An alternative to drawing drinking water directly from irrigation canals or village water...... households in 10 villages. Separate surveys were undertaken to collect information on hygiene behaviour, sanitary facilities, and socio-economic status. RESULTS: Seepage water was of much better quality than surface water, but this did not translate into less diarrhoea. This could only be partially explained....... The association between water quality and diarrhoea varied by the level of water availability and the presence or absence of a toilet. Among people having a high quantity of water available and a toilet, the incidence rate of diarrhoea was higher when surface water was used for drinking than when seepage water...

  16. Pennsylvania Village to Get Safe, Reliable Water Supply

    Science.gov (United States)

    A Pennsylvania village whose unfiltered, contaminated water source made it the top violator of federal and state drinking water laws will be connected to a public water system in 2015 with $2.2 million from EPA’s Drinking Water State Revolving Fund

  17. Securing a better future for all: making a difference with nuclear technology

    International Nuclear Information System (INIS)

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  18. Water You Engineering? An Activity to Develop Water-Quality Awareness

    Science.gov (United States)

    Riskowski, Jody; Todd, Carrie Davis

    2009-01-01

    Water is one of our most precious resources. However, for many in the United States, having fresh, safe drinking water is taken for granted, and due to this perceived lack of relevance, students may not fully appreciate the luxury of having safe running water--in the home. One approach to resolving water-quality issues in the United States may…

  19. Water conservation and allocation guideline for oilfield injection

    International Nuclear Information System (INIS)

    2006-01-01

    This paper was prepared as a guide for regulatory agencies and developers using non-saline water sources in enhanced oil recovery (EOR) schemes. A systems approach was used to achieve specific environmental outcomes that adhered to the Water Conservation and Allocation Policy for Oilfield Injection. The guide was applicable to licence renewal applications for projects operating and licensed to use non-saline water resources, as well as new licence applications for oilfield injection use. The guide provided recommended water conservation practices and application requirements, and outlined regulatory procedures and steps for obtaining a Water Act licence. The guideline was prepared to eliminate the use of non-saline water in EOR projects where feasible alternatives existed, as well as to identify areas with water shortages and reduce the use of non-saline water. The guide included monitoring and reporting requirements to improve the evaluation of water use practices and outlined current initiatives to address water conservation and research. It was concluded that outcomes from the program will include reliable quality water supplies for a sustainable economy, healthy aquatic ecosystems, and safe, secure drinking water supplies for Albertans. 3 tabs., 5 figs

  20. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  1. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  2. A Hard Month's Work in Manila. Securing Radioactive Sources

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  3. The Effects of Prompting and Reinforcement on Safe Behavior of Bicycle and Motorcycle Riders

    Science.gov (United States)

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was…

  4. Safe Swimming (A Minute of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2017-06-01

    Most outbreaks linked to pools and water playgrounds are caused by Cryptosporidium. This podcast discusses ways to keep you healthy and safe while swimming.  Created: 6/1/2017 by MMWR.   Date Released: 6/1/2017.

  5. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  6. DESIGN MODELING OF A UNIVERSITY’S COMPREHENSIVE-INTEGRATED SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Marina V. Dulyasova

    2017-03-01

    Full Text Available Introduction: the safety of higher education institutions is considered to be of great importance nowadays. Security challenges need to be addressed through a comprehensive and integrative approach. This approach provides neutralisation of various threats systemically, risk prevention, minimisation of the tangible and moral harm. The project concept of “safe university” is proposed and substantiated for the above-mentioned purposes. Materials and Methods: the authors used a special literature survey on the issue, which is divided into three main groups of publications, where the complex security of educational institutions is considered in the context of the general theory of security, in the educational-methodical plan and within the framework of sociological, psychological and pedagogical approaches. The legislative and regulatory sources also indicated, legislative and regulatory legal acts reviews, “Safe City” concept, National standard “Information security technologies: complex and integrated ones. Standard requirements to architecture and technologies of intellectual systems of monitoring for safety of the companies and the territories” (State standard specification P 56875-2016, documents of higher education institutions, media reports. The analysis and generalisation of information was coupled with project modeling of the new comprehensive system of higher education institution security. Results: the authors introduce the concept, architecture and model of the comprehensive integrated higher education institution security, monitoring based on measures and indicators pertaining to implementation of standard requirements and level of satisfaction with safety, evaluation of the taken measures in terms of efficiency. Discussion and Conclusions: the main contours of the model for comprehensive integrated security system in a higher education institution and algorithm of interaction between the subjects are determined. These

  7. Implications of inherent safe nuclear power system

    International Nuclear Information System (INIS)

    Song, Yo-Taik

    1987-01-01

    The safety of present day nuclear power reactors and research reactors depends on a combination of design features of passive and active systems, and the alert judgement of their operators. A few inherently safe designs of nuclear reactors for power plants are currently under development. In these designs, the passive systems are emphasized, and the active systems are minimized. Also efforts are made to eliminate the potential for human failures that initiate the series of accidents. If a major system fails in these designs, the core is flooded automatically with coolants that flow by gravity, not by mechanical pumps or electromagnetic actuators. Depending on the choice of the coolants--water, liquid metal and helium gas--there are three principal types of inherently safe reactors. In this paper, these inherently safe reactor designs are reviewed and their implications are discussed. Further, future perspectives of their acceptance by nuclear industries are discussed. (author)

  8. Assessment of agricultural drainage water quality for safe reuse in irrigation applications-a case study in Borg El-Arab, Alexandria

    Directory of Open Access Journals (Sweden)

    Mahmoud Nasr

    2015-03-01

    Full Text Available Objective: To demonstrate the technical feasibility of the reuse of agricultural drainage water for irrigation. Methods: The agricultural drainage water near Banjar El-Sokar, Borg El-Arab City, Alexandria, Egypt was collected. The measured heavy metals in the drainage water were compared with the permissible levels stated in environmental regulations, Law No. 48 of 1982 concerning the protection of the Nile River and waterways from pollution. Results: Heavy metals and trace elements were detected in this agricultural drainage water as following: Al (1.64 mg/L, Ca (175.00 mg/L, Cd (1.87 mg/L, Co (2.23 mg/L, Cu (1.71 mg/L, Fe (1.64 mg/L, K (20.50 mg/L, and Pb (2.81 mg/L. According to allowable limits, item such as Fe is lower than permissible level of 3.00 mg/L, while Pb and Cu are higher than 0.10 mg/L and 1.00 mg/L, respectively. Conclusions: Vegetables irrigated with such drainage water are not safe for human and animal consumption. Accordingly, the study suggests and recommeds remediation of drainage water using physical, chemical and/or biological methods.

  9. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  10. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  11. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  12. Recent Developments in Microbiological Approaches for Securing Mine Wastes and for Recovering Metals from Mine Waters

    Directory of Open Access Journals (Sweden)

    D. Barrie Johnson

    2014-04-01

    Full Text Available Mining of metals and coals generates solid and liquid wastes that are potentially hazardous to the environment. Traditional methods to reduce the production of pollutants from mining and to treat impacted water courses are mostly physico-chemical in nature, though passive remediation of mine waters utilizes reactions that are catalysed by microorganisms. This paper reviews recent advances in biotechnologies that have been proposed both to secure reactive mine tailings and to remediate mine waters. Empirical management of tailings ponds to promote the growth of micro-algae that sustain populations of bacteria that essentially reverse the processes involved in the formation of acid mine drainage has been proposed. Elsewhere, targeted biomineralization has been demonstrated to produce solid products that allow metals present in mine waters to be recovered and recycled, rather than to be disposed of in landfill.

  13. 76 FR 12719 - Safe Schools/Healthy Students Program; Office of Safe and Drug-Free Schools; Safe Schools/Healthy...

    Science.gov (United States)

    2011-03-08

    ... DEPARTMENT OF EDUCATION Safe Schools/Healthy Students Program; Office of Safe and Drug- Free Schools; Safe Schools/Healthy Students Program; Catalog of Federal Domestic Assistance (CFDA) Numbers: 84... priorities, requirements, and definitions under the Safe Schools/Healthy Students (SS/HS) program. Since...

  14. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  15. Securing water for the cities.

    Science.gov (United States)

    Satterthwaite, D

    1993-01-01

    Many cities in developing countries have grown so much that they can no longer provide adequate, sustainable water. Over pumping in Dakar and Mexico City has forced those cities to obtain water from ever more distant sources. In Dakar, the result has been saltwater intrusion. Overpumping has caused Mexico City to sink, in some areas by as much as 9 m, resulting in serious damage to buildings and sewage and drainage pipes. Other cities facing similar water problems are coastal cities in Peru (e.g., Lima), La Rioja and Catamarca in Argentina, cities in Northern Mexico, and cities in dry areas of Africa. For some cities, the problem is not so much ever more distant water supplies but insufficient funds to expand supplies. Bangkok and Jakarta both face saltwater intrusion into their overdrawn aquifers. Even through agriculture is the dominant user of water in most countries, demand concentrated in a small area exhausts local and regional sources and pollutes rivers, lakes, and coasts with untreated human and industrial waste. Most cities in Africa and Asia do not have a sewerage system. Further, most cities do not have the drains to deal with storm water and external floodwater, causing frequent, seasonal flooding. The resulting stagnant water provides breeding grounds for insect vectors of diseases (e.g., malaria). The problems in most cities are a result of poor management, not lack of water. Reducing leaks in existing piped distribution systems from the usual 60% loss of water to leaks to 12% would increase the available water 2-fold. Another way to address water shortages would be commercial, industrial, and recreational use of minimally treated waste water, such as is the case in Madras and Mexico City. Political solutions are needed to resolve inadequate water supply and waste management.

  16. Safe Re-use Practices in Wastewater-Irrigated Urban Vegetable Farming in Ghana

    DEFF Research Database (Denmark)

    Keraita, Bernard; Abaidoo, R.C; Beernaerts, I.

    2012-01-01

    of stakeholders at different levels along the food chain. This paper presents an overview of safe re-use practices including farm-based water treatment methods, water application techniques, post-harvest handling practices, and washing methods. The overview is based on a comprehensive analysis of the literature......Irrigation using untreated wastewater poses health risks to farmers and consumers of crop products, especially vegetables. With hardly any wastewater treatment in Ghana, a multiple-barrier approach was adopted and safe re-use practices were developed through action research involving a number...... and our own specific studies, which used data from a broad range of research methods and approaches. Identifying, testing, and assessment of safe practices were done with the active participation of key actors using observations, extensive microbiological laboratory assessments, and field...

  17. 29 CFR 2550.404a-3 - Safe harbor for distributions from terminated individual account plans.

    Science.gov (United States)

    2010-07-01

    ... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-3 Safe... rate of return, whether or not such return is guaranteed, consistent with liquidity (except that... liquidity; (v) A statement explaining what fees, if any, will be paid from the participant or beneficiary's...

  18. Burning Phosphorus under Water Safely

    Science.gov (United States)

    Taylor, Larry C.

    1997-09-01

    A safer method for demonstrating the burning of white phosphorous under water is described. This demonstration uses 3% hydrogen peroxide solution and manganese dioxide as the oxygen source, eliminating the use of potentially explosive potassium chlorate. The oxygen generation is manually controlled by means of a stopcock on the dropping funnel. The apparatus has been designed to provide a most spectacular display, especially in the dark, lasting an hour or longer if desired, and eliminates the noxious phosphorous odor.

  19. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  20. Safe new reactor for radionuclide production

    International Nuclear Information System (INIS)

    Gray, P.L.

    1995-01-01

    In late 1995, DOE is schedule to announce a new tritium production unit. Near the end of the last NPR (New Production Reactors) program, work was directed towards eliminating risks in current designs and reducing effects of accidents. In the Heavy Water Reactor Program at Savannah River, the coolant was changed from heavy to light water. An alternative, passively safe concept uses a heavy-water-filled, zircaloy reactor calandria near the bottom of a swimming pool; the calandria is supported on a light-water-coolant inlet plenum and has upflow through assemblies in the calandria tubes. The reactor concept eliminates or reduces significantly most design basis and severe accidents that plague other deigns. The proven, current SRS tritium cycle remains intact; production within the US of medical isotopes such as Mo-99 would also be possible

  1. Versatile Endpoint Storage Security with Trusted Integrity Modules

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    2014-01-01

    . To counter such threats, and to remain trustworthy, personal devices should enforce storage security. State-of-the-art storage security solutions rely on hardware protected encryption. They cannot be deployed, as such, on personal devices either because they require additional hardware (e.g., NetApp’s Safe...... system and applications, that guarantee the durability, confidentiality and integrity of a configurable subset of the filesystem data and meta-data. While, we detail our design with the Linux virtual file system, we expect that our results can be applied to a range of different file systems. As Trusted...

  2. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  3. Clean power from deserts. The DESERTEC concept for energy, water and climate security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    The main challenge for the future is to reclaim energy from renewable and clean sources in environmentally compatible ways. Here the deserts of the earth can play a key role. They receive about 700 times more energy from the sun than humankind consumes by burning fossil fuels, day by day. Deserts are the places with the best solar radiation conditions and with the least possible impact of collector deployment onto the biosphere on earth. In deserts, clean power can be produced by solar thermal power plants (CSP) in a truly sustainable way and at any volume of conceivable demand. Power can be transmitted with low losses by high voltage direct current (HVDC) lines to more than 90% of the world's population. This gives the deserts a new role: Together with the many other forms of accessible renewable energy the newly utilized desert would enable us to replace fossil fuels and thus end the ongoing destruction of our natural living conditions. To put this into practice, countries with deserts, countries with high energy demand and countries with technology competence must cooperate. This is an opportunity for the Mediterranean riparian regions of Europe, the Middle East and North Africa (EUMENA) to form a community for energy, water and climate security. With the political will, EUMENA countries could now launch 'EUMENA-DESERTEC' Program, to bring humankind back into balance with its environment, by putting deserts and technology into service for energy, water and climate security. This would be an important step towards creating a truly sustainable civilization.

  4. Reducing Maternal Mortality in Papua New Guinea: Contextualizing Access to Safe Surgery and Anesthesia.

    Science.gov (United States)

    Dennis, Alicia T

    2018-01-01

    Papua New Guinea has one of the world's highest maternal mortality rates with approximately 215 women dying per 100,000 live births. The sustainable development goals outline key priority areas for achieving a reduction in maternal mortality including a focus on universal health coverage with safe surgery and anesthesia for all pregnant women. This narrative review addresses the issue of reducing maternal mortality in Papua New Guinea by contextualizing the need for safe obstetric surgery and anesthesia within a structure of enabling environments at key times in a woman's life. The 3 pillars of enabling environments are as follows: a stable humanitarian government; a safe, secure, and clean environment; and a strong health system. Key times, and their associated specific issues, in a woman's life include prepregnancy, antenatal, birth and the postpartum period, childhood, adolescence and young womanhood, and the postchildbearing years.

  5. THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION

    Directory of Open Access Journals (Sweden)

    O. A. Selivanov

    2013-01-01

    Full Text Available The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. The author regards actualization of teenagers’ life experience as a promising direction for exploring the opportunities for creating the safe social environment.The individual socio-psychological functioning is delineated as a multilevel correlation of internal and external human resources used for resolving difficult situations. According to the author, the prompt mobilization of internal resources of a teenager, training the ability to apply the external resources for solving the problem and developing the safe behavior can improve the quality of life in the modern society. Along with the risks of modern information society, the author emphasizes a number of dangerous social trends: disruption of social institutions, ifantilization of education, distortion of historical cultural channels, and devaluation of the collectivism idea.In author’s opinion, teenagers should get some special knowledge and individual training to develop the skills of safe behavior in actual situations; and the prospects of the modern society considerably depend on the above procedures. 

  6. 33 CFR 165.1410 - Security Zones; Kauai, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Kauai, HI. 165..., HI. (a) Location. The following areas, from the surface of the water to the ocean floor, are security... Nawiliwili Harbor, Kauai, HI or within 3 nautical miles seaward of the Nawiliwili Harbor COLREGS DEMARCATION...

  7. 29 CFR 2550.404a-2 - Safe harbor for automatic rollovers to individual retirement plans.

    Science.gov (United States)

    2010-07-01

    ... retirement plans. 2550.404a-2 Section 2550.404a-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-2 Safe..., whether or not such return is guaranteed, consistent with liquidity; (ii) For purposes of paragraph (c)(3...

  8. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  9. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  10. Integrating Safety and Security in the EU: Past developments and suggested ways forward

    International Nuclear Information System (INIS)

    Rossi, Loris

    2016-01-01

    The Framework provided by the UN Model Regulation for the Transport of Dangerous Goods is the core of the legislation on transport of radioactive material (and all classes of dangerous goods) in the EU. This has resulted in European agreements ADR, RID and ADN for international transport as well as a single directive for land transport within the EU. In addition the EU has adopted a range of directives and regulations dealing specifically with several aspects of safety of nuclear and radioactive material. While the overall safety framework is now well developed and fairly stable, a security framework is evolving, based on the IAEA recommendations. In the EU, several initiatives such as the CBRN action plan and the review of the application of telematics for the transport of dangerous goods will most likely result in more developments coming on stream in the near future. This suggests that an integrated approach would be beneficial to avoid divergent developments and to keep track of new developments in an orderly fashion. An integrated approach for a safe and secure supply chain for radioactive material is proposed. The framework for a supply chain can be built around the extensive corpus of legislation/recommendations and concepts that are already existing (such as the “Known Consignor” in the framework of the EU aviation security or the “Authorised Economic Operator” in the EU Community Custom Code). This would allow for the need to maintain control of the numerous proposals that are taking place. Advantages and drawbacks are outlined. More generally, the development of an integrated safe and secure supply chain would bring clarity and transparency to the overall system of provisions for a safe and secure management of radioactive material. (author)

  11. Fail-safe first wall for preclusion of little leakage

    International Nuclear Information System (INIS)

    Shibui, Masanao; Nakahira, Masataka; Tada, Eisuke; Takatsu, Hideyuki

    1994-05-01

    Leakages although excluded by design measures would occur most probably in highly stressed areas, weldments and locations without possibility to classify the state by in-service inspection. In a water-cooled first wall, allowable leak rate of water is generally very small, and therefore, locating of the leak portion under highly activated environment will be very difficult and be time-consuming. The double-wall concept is promising for the ITER first wall, because it can be made fail-safe by the application of the leak-before-break and the multiple load path concepts, and because it has a potential capability to solve the little leak problem. When the fail safe strength is well defined, subcritical crack growth in the damaged wall can be permitted. This will enable to detect stable leakage of coolant without deteriorating plasma operation. The paper deals with the little leak problem and presents method for evaluating small leak rate of a liquid coolant from crack-like defects. The fail-safe first wall with the double-wall concept is also proposed for preclusion of little leakage and its fail-safety is discussed. (author)

  12. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  13. Computer Security: “Heartbleed” - a disaster for privacy

    CERN Multimedia

    Computer Security Team

    2014-01-01

    "On a scale of 1 to 10, this is an 11,” claimed the famous security expert Bruce Schneier (see here). Indeed, the serious vulnerability dubbed “Heartbleed” affects everyone who relies on secure and private Internet communication. You cannot avoid it, so let’s see how it affects you.   “Heartbleed” is the name that's been given to a vulnerability for OpenSSL (CVE-2014-0160). This software implements “the Secure Socket Layer (SSL v2/v3) and Transport Layer Security (TLS) protocols as well as a full-strength general purpose cryptography library”. SSL and TLS protocols are used to encrypt any communication between a client and a server, and to ensure that your communication is safe from eavesdropping or spying - that is, until 2012, when this bug was introduced. It allows the extraction of the first 64 kB from the memory of a server or client using OpenSSL (not necessarily web servers), and can potent...

  14. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  15. [Evaluation of food and nutrition security in families in the district of los morochucos in Ayacucho, Peru].

    Science.gov (United States)

    Pillaca, Susan; Villanueva, María

    2015-01-01

    To evaluate food and nutrition security in families of Los Morochucos district in Ayacucho, Peru. A study based on interpretation of available information from official sources and surveys carried out to gather information not recorded in these sources. Sampling was stratified and two-staged comprising 128 families with at least one child under 12 years. The variables were the level of food security, family perception of their situation of availability of and access to food, exclusive breastfeeding, feeding during episodes of diarrhea, frequency of food consumption, consumption of safe water, hand washing, proper toilets, stable food supply, nutrition and health status, chronic malnutrition, anemia and parasitic infections in children aged 6 months to three years. 39.1% of families had food security, 37.5% were food insecure without hunger, 18.8% had food insecurity with hunger, and 4.7% had food insecurity with severe hunger. They had acceptable calorie intake, but did not have a balanced diet. There was no chlorinated water. During the episodes of diarrhea, 72% of mothers fed the child with mate (tea) or broth. A great quantity of their crops were lost in 2011. Of children 6 months to three years, 34.5% presented chronic malnutrition, 42.4% had anemia and 61.6% had parasites. Food and nutrition insecurity in this district of Ayacucho is considerable and there should be prioritization of the implementation of investment projects with the aim of contributing to the development of the community.

  16. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  17. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  18. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  19. Water Safety (Recreational)

    Science.gov (United States)

    Playing in the water - whether swimming, boating or diving - can be fun. It can also be dangerous, especially for children. Being safe can ... injuries and drowning. To stay safe in the water Avoid alcohol when swimming or boating Wear a ...

  20. 33 CFR 106.255 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated, and...

  1. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  2. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  3. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  4. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  5. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    -driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...

  6. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  7. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  8. A Novel Cloud Computing Algorithm of Security and Privacy

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chen

    2013-01-01

    Full Text Available The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS, to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.

  9. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  10. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  11. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  12. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  13. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  14. Safe shutdown analysis for submerged equipment inside containment

    International Nuclear Information System (INIS)

    Song, Dong Soo; Lee, Seung Chan; Yoon, Duk Joo; Ha, Sang Jun

    2017-01-01

    The purpose of the paper is to analyze internal flooding effects on the submerged safety-related components inside containment building. Safe shutdown analysis has been performed based on the criteria, assumptions and guideline provided in ANSI/ANS-56.11-1988 and ANSI/ANS-58.11-1988. Flooding can be postulated from a failure of several systems located inside the containment. Loss of coolant accident (LOCA), Feed water line break (FWLB), and other pipe breaks/cracks are assumed. The worst case flooding scenario is a large break LOCA. The maximum flood level for a large break LOCA is calculated based on the combined inventory of the reactor coolant system, the three accumulators, the boron injection tank (BIT), the chemical additive tank (CAT), and the refueling water storage tank (RWST) flooding the containment. The maximum flood level that could occur from all of the water which is available in containment is 2.3 m from the base elevation. A detailed flooding analysis for the components has been performed to demonstrate that internal flooding resulting from a postulated initiating event does not cause the loss of equipment required to achieve and maintain safe shutdown of the plant, emergency core cooling capability, or equipment whose failure could result in unacceptable offsite radiological consequences. The flood height can be calculated as h = (dh/dt) x (t-t 0 ) + h 0 , where h = time dependent flood height and subscript 0 means the initial value and height slope dh/dt. In summary, the submerged components inside containment are acceptable because they complete the mission of safety injection (SI) prior to submeregency or have no safe shutdown function including containment isolation during an accident. (author)

  15. Current status of securing Category 1 and 2 radioactive sources in Taiwan

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Y-F.; Tsai, C-H. [Atomic Energy Council of Executive Yuan of Taiwan (China)

    2014-07-01

    For enhancing safe and secure management of Category 1 and 2 radioactive sources against theft or unauthorized removal, AEC (Atomic Energy Council) of Taiwan have been regulating the import/export of the sources ever since 2005, in compliance with the IAEA's (International Atomic Energy Agency) 'Guidance on the Import and Export of Radioactive Sources'. Furthermore in consulting the IAEA Nuclear Security Series No.11 report, administrative regulations on the program of securing the sources have been embodied into AECL's regulatory system since 2012, for the purpose of enforcing medical and non-medical licensees and industrial radiographers to establish their own radioactive source security programs. Regulations require that security functions such as access control, detection, delay, response and communication and security management measures are to be implemented within the programs. This paper is to introduce the current status in implementing the security control measures in Taiwan. (author)

  16. Report: EPA Needs to Assess the Quality of Vulnerability Assessments Related to the Security of the Nation’s Water Supply

    Science.gov (United States)

    Report #2003-M-00013, September 24, 2003. In connection with our ongoing evaluation of the Environmental Protection Agency’s (EPA’s) activities to enhance the security of the Nation’s water supply, we noted an issue that requires your immediate attention.

  17. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  18. Governing food security. Law, politics and the right to food

    NARCIS (Netherlands)

    Hospes, O.; Hadiprayitno, I.

    2010-01-01

    With only five years left until the 2015 deadline to achieve the Millennium Development Goals, food security still is a dream rather than reality: 'a situation that exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary

  19. 33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land...

  20. A stepped wedge, cluster-randomized trial of a household UV-disinfection and safe storage drinking water intervention in rural Baja California Sur, Mexico.

    Science.gov (United States)

    Gruber, Joshua S; Reygadas, Fermin; Arnold, Benjamin F; Ray, Isha; Nelson, Kara; Colford, John M

    2013-08-01

    In collaboration with a local non-profit organization, this study evaluated the expansion of a program that promoted and installed Mesita Azul, an ultraviolet-disinfection system designed to treat household drinking water in rural Mexico. We conducted a 15-month, cluster-randomized stepped wedge trial by randomizing the order in which 24 communities (444 households) received the intervention. We measured primary outcomes (water contamination and diarrhea) during seven household visits. The intervention increased the percentage of households with access to treated and safely stored drinking water (23-62%), and reduced the percentage of households with Escherichia coli contaminated drinking water (risk difference (RD): -19% [95% CI: -27%, -14%]). No significant reduction in diarrhea was observed (RD: -0.1% [95% CI: -1.1%, 0.9%]). We conclude that household water quality improvements measured in this study justify future promotion of the Mesita Azul, and that future studies to measure its health impact would be valuable if conducted in populations with higher diarrhea prevalence.