WorldWideScience

Sample records for security assistance force

  1. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  2. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  3. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  4. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  5. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  6. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  7. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  8. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2009-01-01

    ...), which would function much like our military reserve. It would ease the burden on the Armed Forces by allowing the hiring of civilians with critical skills to serve on missions abroad when America needs...

  9. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  10. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  11. Institutionalizing Security Force Assistance

    Science.gov (United States)

    2008-05-19

    long before current conflicts developed. An Australian Armoured [sic] Corps Officer with experience in both the Solomon Islands and Iraq noted...and the national level policy. Despite some turnover and changes among the senior military and civilian leadership, the underlying tone has not

  12. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  13. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  14. The Law of Force or The Force of Law: Does Following The Rule of Law Assist Security Forces in Defeating an Armed Insurgency?

    Science.gov (United States)

    2012-06-08

    and Policy in International Relations (Spring): 40-79 Arendt , Hannah . 1963. On revolution. New York: Viking Cohen, Eliot A., John Horvath, and...conditions, where the armed forces can be trusted to obey the civil authorities” ( Arendt 1965, 40). This is especially the case in countries where

  15. Why Security Force Assistance Fails

    Science.gov (United States)

    2016-05-26

    military intervention, along with Rumsfeld’s vision of transformation, permeated the philosophy behind the planning process for invading Iraq.66...accessed March 23, 2016, http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. 37...Martin Smith. Aired October 28, 2014. Accessed March 23, 2016. http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. Paul, Christopher et al. What Works

  16. Security Force Assistance and Security Sector Reform

    Science.gov (United States)

    2013-09-01

    regional trade, on the region’s tourism and fish- ing industries, and on food prices.”42 Other ungoverned maritime territory attractive to illicit...Verde, Mali, Benin, Togo, and Ghana. Drugs from Colombia and Peru , which often transit through Brazil, are shipped across the Atlantic and enter...intrastate struggles that pitted ideological movements against regimes they sought to change. These included Sendero Luminoso in Peru , the Farabundo

  17. Forced Shortsightedness: Security Force Assistance Missions

    Science.gov (United States)

    2014-06-01

    accomplished something no other al-Qaeda franchise has ever been able to pull off: conquering and governing a broad swath of a sovereign country, then...marginalized and disadvantaged .”58 Boko Haram has capitalized on the increasing north-south divide and subsequently has increased the frequency and...groups.”70 VENs, such as AQIM and Boko Haram, are internal threats competing for victory over the people and taking advantage of the lack of

  18. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  19. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  20. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  1. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  2. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  3. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  4. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  5. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  6. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  7. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  8. Turkey’s Strategy towards Afghanistan: Security and Development Assistance

    Directory of Open Access Journals (Sweden)

    Altunay Ilgar Aliyeva

    2016-01-01

    Full Text Available Providing assistance to the least developed countries has remained one of the top priorities for leading international actors in the XXI century, and the Republic of Turkey is no exception in this regard. The Justice and Development Party's ascension to power in 2002 led to a drastic revision of the Turkish foreign policy and adoption of a novel approach to the least developed countries accounting for the complex interdependence between security and development. This approach was tested in Afghanistan where Turkey contributed to both post-conflict reconstruction of the country and to the activities of the International Security Assistance Force (ISAF. Since 2015 Turkey has been actively engaged in the new NATO 'Resolute Support' mission, while continuing its economic support to Afghanistan on bilateral and multilateral basis. This paper aims to unveil the particularities of the Turkey's Afghan strategy, which has yet escaped the Russian scholars' attention, with the help of the Turkish primary sources and academic works. It studies the specificity of bilateral relations and their determinants, including historic ties and religious and cultural proximity. It provides an in-depth analysis of the activities of both Turkish Cooperation and Development Agency (TIKA and the Turkish Provincial Reconstruction Team (PRT in Afghanistan and examines the challenges of Turkish troops' presence on the Afghan soil and the way how the Turkish elites and Turkey's NATO allies perceive it.

  9. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  10. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  11. The DISAM Journal of International Security Assistance Management. Volume 25, Number 3, Spring 2003

    Science.gov (United States)

    2003-01-01

    OES Initiatives 4.000 2.000 1.500 Partnerships to Eliminate Sweatshops 4.000 4.000 2.000 Policy Initiatives 0.000 20.250 0.000 Subtotal – Global... disadvantaged youth. Limitation on Assistance to Security Forces (Section 556) • None of the funding made available by this Act may be provided to any

  12. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  13. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  14. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  15. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  16. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  17. Forced displacement and women's security in Colombia.

    Science.gov (United States)

    Meertens, Donny

    2010-04-01

    In the protracted Colombian conflict, assistance to internally displaced persons has developed in the context of contradictory political processes. The Colombian government's launching of a transitional justice process in the midst of armed conflict has generated a complex situation displaying both conflict and post-conflict characteristics. The progressive Constitutional Court rulings on internal displacement, in particular the gender-sensitive Auto 092, constitute an attempt to bring together humanitarian interventions and transitional justice measures in a rights-based framework. However, the national government is reluctant to adopt them fully and local realities still hamper their integrated implementation. Displaced women, therefore, remain in an especially vulnerable position. This paper argues that gender-sensitive humanitarian interventions must take into account all of these complexities of scale and political process in order to make legal frameworks more effective at the local level. In these contexts, interventions should pay particular attention to strategies that contribute to transforming pre-existing gender regimes.

  18. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  19. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  20. Force fluctuations assist nanopore unzipping of DNA

    International Nuclear Information System (INIS)

    Viasnoff, V; Chiaruttini, N; Muzard, J; Bockelmann, U

    2010-01-01

    We experimentally study the statistical distributions and the voltage dependence of the unzipping time of 45 base-pair-long double-stranded DNA through a nanopore. We then propose a quantitative theoretical description considering the nanopore unzipping process as a random walk of the opening fork through the DNA sequence energy landscape biased by a time-fluctuating force. To achieve quantitative agreement fluctuations need to be correlated over the millisecond range and have an amplitude of order k B T/bp. Significantly slower or faster fluctuations are not appropriate, suggesting that the unzipping process is efficiently enhanced by noise in the kHz range. We further show that the unzipping time of short 15 base-pair hairpins does not always increase with the global stability of the double helix and we theoretically study the role of DNA elasticity on the conversion of the electrical bias into a mechanical unzipping force.

  1. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  2. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  3. 12 CFR 615.5560 - Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities.

    Science.gov (United States)

    2010-01-01

    ... Assistance Corporation (Financial Assistance Corporation) is a federally chartered instrumentality of the... Corporation securities). The Financial Assistance Corporation may prescribe the forms, the denominations, the...

  4. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  5. Security and emergency management technical assistance for the top 50 transit agencies

    Science.gov (United States)

    2007-04-01

    Between May 2002 and July 2006, the Federal Transit Administration (FTA) provided technical assistance to the top 50 transit agencies through the Security and Emergency Management Technical Assistance Program (SEMTAP). The scope and purpose of the pr...

  6. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Science.gov (United States)

    Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  7. Two-cloud-servers-assisted secure outsourcing multiparty computation.

    Science.gov (United States)

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  8. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  9. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  10. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  11. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  12. Security Force Assistance Logistics: The Key to Self-Reliance?

    Science.gov (United States)

    2011-05-19

    ranks. In 1901 Lord Horatio Herbert Kitchener incorporated these “armed native troops” into “scouting missions for his flying columns” and also used...advice; the result: a French military mission.”189 General Pierre Boyer and fourteen French officers arrived in 1824 with the mission to complete the

  13. The Brigade Combat Team - Stability and Security Force Assistance Operations

    Science.gov (United States)

    2010-02-22

    it makes absolute sense to embed these transition teams within the brigade, assigned within the brigade. The beauty of this is that it allows the...accessed October 19, 2009). 22 COL Peter Newell, “Department of Defense Bloggers Roundtable with COL Peter Newell, Subject: Completion of Advise and

  14. Logistics in Security Force Assistance: Sustainable Partner Development

    Science.gov (United States)

    2014-05-22

    93Khuyen, 446. 94See Lieutenant General Joseph M. Heiser , Jr., CMH Pub 90-15, Logistic Support (Washington, DC: Center of Military History, U.S. Army...Government Printing Office, 2009. Heiser , Joseph M. Jr., Lieutenant General. CMH Pub 90-15, Logistic Support. Washington, DC: Center of Military

  15. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  16. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  17. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  18. Compact Hip-Force Sensor for a Gait-Assistance Exoskeleton System.

    Science.gov (United States)

    Choi, Hyundo; Seo, Keehong; Hyung, Seungyong; Shim, Youngbo; Lim, Soo-Chul

    2018-02-13

    In this paper, we propose a compact force sensor system for a hip-mounted exoskeleton for seniors with difficulties in walking due to muscle weakness. It senses and monitors the delivered force and power of the exoskeleton for motion control and taking urgent safety action. Two FSR (force-sensitive resistors) sensors are used to measure the assistance force when the user is walking. The sensor system directly measures the interaction force between the exoskeleton and the lower limb of the user instead of a previously reported force-sensing method, which estimated the hip assistance force from the current of the motor and lookup tables. Furthermore, the sensor system has the advantage of generating torque in the walking-assistant actuator based on directly measuring the hip-assistance force. Thus, the gait-assistance exoskeleton system can control the delivered power and torque to the user. The force sensing structure is designed to decouple the force caused by hip motion from other directional forces to the sensor so as to only measure that force. We confirmed that the hip-assistance force could be measured with the proposed prototype compact force sensor attached to a thigh frame through an experiment with a real system.

  19. Compact Hip-Force Sensor for a Gait-Assistance Exoskeleton System

    Directory of Open Access Journals (Sweden)

    Hyundo Choi

    2018-02-01

    Full Text Available In this paper, we propose a compact force sensor system for a hip-mounted exoskeleton for seniors with difficulties in walking due to muscle weakness. It senses and monitors the delivered force and power of the exoskeleton for motion control and taking urgent safety action. Two FSR (force-sensitive resistors sensors are used to measure the assistance force when the user is walking. The sensor system directly measures the interaction force between the exoskeleton and the lower limb of the user instead of a previously reported force-sensing method, which estimated the hip assistance force from the current of the motor and lookup tables. Furthermore, the sensor system has the advantage of generating torque in the walking-assistant actuator based on directly measuring the hip-assistance force. Thus, the gait-assistance exoskeleton system can control the delivered power and torque to the user. The force sensing structure is designed to decouple the force caused by hip motion from other directional forces to the sensor so as to only measure that force. We confirmed that the hip-assistance force could be measured with the proposed prototype compact force sensor attached to a thigh frame through an experiment with a real system.

  20. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  1. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  2. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  3. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    Science.gov (United States)

    2015-12-01

    the USASAC leads the AMC Security Assistance Enterprise (ASAE), as well as cases associated with Foreign Military Sales (FMS) (Turner 2012, 5). The...reforms, excess defense articles, U.S. Army Security Assistance Command, Foreign Military Sales 15. NUMBER OF PAGES 73 16. PRICE CODE 17...Contract Audit Agency DCMA Defense Contract Management Agency DCS Direct Commercial Sales DELG Defense Export Loan Guarantee DISAM Defense

  4. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  5. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  6. Promoting exercise behaviour in a secure mental health setting: Healthcare assistant perspectives.

    Science.gov (United States)

    Kinnafick, Florence-Emilie; Papathomas, Anthony; Regoczi, Dora

    2018-05-30

    Individuals with severe mental illness engage in significantly less amounts of physical activity than the general population. A secure mental health setting can exacerbate barriers to exercise, and facilitate physical inactivity and sedentary behaviour. Healthcare assistants are intimately involved in the daily lives of patients and, therefore, should be considered integral to exercise promotion in secure mental health settings. Our aim was to explore healthcare assistants' perceptions of exercise and their attitudes to exercise promotion for adult patients in a secure mental health hospital. Qualitative semi-structured interviews were conducted with 11 healthcare assistants from a large UK-based secure mental health hospital. Topics included healthcare assistants' personal experiences of exercise within a secure facility, their perceptions of exercise as an effective treatment tool for mental health, and their perceived roles and responsibilities for exercise promotion. Thematic analysis was used to analyse the data. Three main themes were identified: (i) exercise is multi-beneficial to patients, (ii) perceived barriers to effective exercise promotion, and (iii) strategies for effectives exercise promotion. Healthcare assistants considered exercise to hold patient benefits. However, core organizational and individual barriers limited healthcare assistants' exercise promotion efforts. An informal approach to exercise promotion was deemed most effective to some, whereas others committed to more formal strategies including compulsory sessions. With education and organizational support, we propose healthcare assistants are well placed to identify individual needs for exercise promotion. Their consultation could lead to more efficacious, person-sensitive interventions. © 2018 Australian College of Mental Health Nurses Inc.

  7. Taming the wounded lion: Transforming security forces in West Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-01

    Feb 1, 2011 ... Solidarity networks of language and culture link ethnic groups ... policymaking process, financial management issues, defence forces, ... Related articles ... of the developing world's brightest scientists find new ways to improve ...

  8. The Australian Defence Force: Broadened Concepts of Security Operations

    National Research Council Canada - National Science Library

    Wing, Ian

    1998-01-01

    ...-fighting role and could result in fundamental force structure and resource changes. More Australian Government policy changes are possible, and increased participation in counter-drug operations has been foreshadowed...

  9. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  10. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  11. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  12. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  13. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  14. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  15. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  16. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  17. Security Assistance: U.S. and International Historical Perspectives

    Science.gov (United States)

    2006-08-01

    Captain James H. Hausman and the Formation of the Korean Army, 1945-1950,’ Armed Forces and Society, Vol. 23, No. 4 ( Summer 1997): 503-39; Peter Clemens...Parameters, ( Summer 206), p. 61. 10 See: James H. Willbanks, Abandoning Vietnam: How America Left and South Viet­ nam Lost Its War ( Lawrence : University...391 Lessons from the US Advisory Efforts in El Salvador by Dr. Lawrence Cline

  18. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  19. Implementation and Utilization of Security Assistance: A Multi-Country Analysis

    Science.gov (United States)

    2015-09-01

    drug, prohibition or restriction of U.S. humanitarian assistance, severing of diplomatic relations, tax on U.S. assistance, recruitment or use of...and Myanmar /Burma (SIPRI, 2015), where no FMS or FMF engagement took place (DSCA, 2013). Indonesia, a key partner in maritime security and...were India, China, Algeria, Venezuela, Vietnam, Syria, Azerbaijan, Malaysia, Egypt Myanmar /Burma, Indonesia, Iran, UAE, Uganda, Iraq, and Turkey. The

  20. The role of visual and direct force feedback in robotics-assisted mitral valve annuloplasty.

    Science.gov (United States)

    Currie, Maria E; Talasaz, Ali; Rayman, Reiza; Chu, Michael W A; Kiaii, Bob; Peters, Terry; Trejos, Ana Luisa; Patel, Rajni

    2017-09-01

    The objective of this work was to determine the effect of both direct force feedback and visual force feedback on the amount of force applied to mitral valve tissue during ex vivo robotics-assisted mitral valve annuloplasty. A force feedback-enabled master-slave surgical system was developed to provide both visual and direct force feedback during robotics-assisted cardiac surgery. This system measured the amount of force applied by novice and expert surgeons to cardiac tissue during ex vivo mitral valve annuloplasty repair. The addition of visual (2.16 ± 1.67), direct (1.62 ± 0.86), or both visual and direct force feedback (2.15 ± 1.08) resulted in lower mean maximum force applied to mitral valve tissue while suturing compared with no force feedback (3.34 ± 1.93 N; P forces on cardiac tissue during robotics-assisted mitral valve annuloplasty suturing, force feedback may be required. Copyright © 2016 John Wiley & Sons, Ltd.

  1. Radiation-Force Assisted Targeting Facilitates Ultrasonic Molecular Imaging

    Directory of Open Access Journals (Sweden)

    Shukui Zhao

    2004-07-01

    Full Text Available Ultrasonic molecular imaging employs contrast agents, such as microbubbles, nanoparticles, or liposomes, coated with ligands specific for receptors expressed on cells at sites of angiogenesis, inflammation, or thrombus. Concentration of these highly echogenic contrast agents at a target site enhances the ultrasound signal received from that site, promoting ultrasonic detection and analysis of disease states. In this article, we show that acoustic radiation force can be used to displace targeted contrast agents to a vessel wall, greatly increasing the number of agents binding to available surface receptors. We provide a theoretical evaluation of the magnitude of acoustic radiation force and show that it is possible to displace micron-sized agents physiologically relevant distances. Following this, we show in a series of experiments that acoustic radiation force can enhance the binding of targeted agents: The number of biotinylated microbubbles adherent to a synthetic vessel coated with avidin increases as much as 20-fold when acoustic radiation force is applied; the adhesion of contrast agents targeted to αvβ3 expressed on human umbilical vein endothelial cells increases 27-fold within a mimetic vessel when radiation force is applied; and finally, the image signal-to-noise ratio in a phantom vessel increases up to 25 dB using a combination of radiation force and a targeted contrast agent, over use of a targeted contrast agent alone.

  2. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  3. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  4. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  5. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  6. Report of the Office of Nuclear Reactor Regulation technical assistance task force

    International Nuclear Information System (INIS)

    1981-11-01

    In 1981, the Director of the Office of Nuclear Reactor Regulation (NRR) of the Nuclear Regulatory Commission (NRC) chartered a task force to assess the office program of technical assistance and to recommend improvements. The task force divided the technical assistance program into four areas, and the practices in each area were assessed through a series of surveys of staff, management, and contractor personnel. The task force placed emphasis in its interview and assessment process on the problem areas that exist in the technical assistance program. The report thus reflects a weight on the faults found as a result of the inquiries made. The four major areas of technical assistance contracting studied were program planning, program management and execution, program control and management information systems, and program administration and coordination

  7. A Security Assistance Example, the U.S. Air Force and the African Coastal Security Program

    Science.gov (United States)

    1989-04-01

    Vol II A205 086 Psychological Strategies in LIC Arms Transfers and the Third World LIC Policy and Strategy Statements iv PREFACE This paper was...a paracommando battalion, located at Atar . Both projects are intended to make the Mauritanian military more of an institution in the country. These...The GARIM has practically no capability to move troops in a timely manner from an air base at Atar to several airstrips along its long, open desert

  8. Building Partner Capacity and Strengthening Security Through Medical Security Force Assistance

    Science.gov (United States)

    2013-06-01

    initially .”..hailed by some as a creation as important to the theoretical development of the social sciences as the calculus had been to the...particularly medical and dental care, can have the unintended consequence of decreasing the population’s confidence in the

  9. Effects of realistic force feedback in a robotic assisted minimally invasive surgery system.

    Science.gov (United States)

    Moradi Dalvand, Mohsen; Shirinzadeh, Bijan; Nahavandi, Saeid; Smith, Julian

    2014-06-01

    Robotic assisted minimally invasive surgery systems not only have the advantages of traditional laparoscopic procedures but also restore the surgeon's hand-eye coordination and improve the surgeon's precision by filtering hand tremors. Unfortunately, these benefits have come at the expense of the surgeon's ability to feel. Several research efforts have already attempted to restore this feature and study the effects of force feedback in robotic systems. The proposed methods and studies have some shortcomings. The main focus of this research is to overcome some of these limitations and to study the effects of force feedback in palpation in a more realistic fashion. A parallel robot assisted minimally invasive surgery system (PRAMiSS) with force feedback capabilities was employed to study the effects of realistic force feedback in palpation of artificial tissue samples. PRAMiSS is capable of actually measuring the tip/tissue interaction forces directly from the surgery site. Four sets of experiments using only vision feedback, only force feedback, simultaneous force and vision feedback and direct manipulation were conducted to evaluate the role of sensory feedback from sideways tip/tissue interaction forces with a scale factor of 100% in characterising tissues of varying stiffness. Twenty human subjects were involved in the experiments for at least 1440 trials. Friedman and Wilcoxon signed-rank tests were employed to statistically analyse the experimental results. Providing realistic force feedback in robotic assisted surgery systems improves the quality of tissue characterization procedures. Force feedback capability also increases the certainty of characterizing soft tissues compared with direct palpation using the lateral sides of index fingers. The force feedback capability can improve the quality of palpation and characterization of soft tissues of varying stiffness by restoring sense of touch in robotic assisted minimally invasive surgery operations.

  10. Security Force Assistance Brigades: A Permanent Force for Regional Engagement and Building Operational Depth

    Science.gov (United States)

    2017-05-25

    their shared sacrifice in the production of this monograph as well as for all my professional endeavors. Next, this monograph would not have been...Philipp Leyde, my seminar leader and mentor whose attention to detail made this monograph a much better product . Mr. Rusty Rafferty, as well as all...the ISF had suffered years of chronic absenteeism and many effective commanders were replaced with political appointments favorable to the Shia

  11. Better Together: SOF and Conventional Forces Integration in Security Force Assistance

    Science.gov (United States)

    2017-06-09

    U.S. advisors referenced within the study would likely desire to advocate for the same, given their personal time and emotion invested...exists on the less harmful end of the corruption spectrum. The more malign brand of corruption, including government officials bargaining with insurgents...concludes that both systems, positive and negative, develop their own brand of social kinetic energy that feeds itself and internally combusts

  12. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  13. Template model inspired leg force feedback based control can assist human walking.

    Science.gov (United States)

    Zhao, Guoping; Sharbafi, Maziar; Vlutters, Mark; van Asseldonk, Edwin; Seyfarth, Andre

    2017-07-01

    We present a novel control approach for assistive lower-extremity exoskeletons. In particular, we implement a virtual pivot point (VPP) template model inspired leg force feedback based controller on a lower-extremity powered exoskeleton (LOPES II) and demonstrate that it can effectively assist humans during walking. It has been shown that the VPP template model is capable of stabilizing the trunk and reproduce a human-like hip torque during the stance phase of walking. With leg force and joint angle feedback inspired by the VPP template model, our controller provides hip and knee torque assistance during the stance phase. A pilot experiment was conducted with four healthy subjects. Joint kinematics, leg muscle electromyography (EMG), and metabolic cost were measured during walking with and without assistance. Results show that, for 0.6 m/s walking, our controller can reduce leg muscle activations, especially for the medial gastrocnemius (about 16.0%), while hip and knee joint kinematics remain similar to the condition without the controller. Besides, the controller also reduces 10% of the net metabolic cost during walking. This paper demonstrates walking assistance benefits of the VPP template model for the first time. The support of human walking is achieved by a force feedback of leg force applied to the control of hip and knee joints. It can help us to provide a framework for investigating walking assistance control in the future.

  14. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  15. Food security and humanitarian assistance among displaced Iraqi populations in Jordan and Syria.

    Science.gov (United States)

    Doocy, Shannon; Sirois, Adam; Anderson, Jamie; Tileva, Margarita; Biermann, Elizabeth; Storey, J Douglas; Burnham, Gilbert

    2011-01-01

    The Iraq conflict resulted in the largest displacement in the Middle East in recent history, and provision of health services to the displaced population presents a critical challenge. With an increase in the number of people affected by complex emergencies and the number of people displaced in urban settings, the international community must adapt intervention strategies to meet the specific demands and contexts of this population. The study aimed to provide information on food security and livelihoods for Iraqi refugees in Syria and Jordan to inform humanitarian assistance planning. National cross-sectional cluster sample surveys of displaced Iraqi populations displaced were conducted in Jordan (October 2008) and Syria (March 2009). Clusters of ten households were randomly selected using probability-based sampling; a total of 1200 and 813 Iraqi households in Jordan and Syria, respectively, were interviewed about food security and receipt of humanitarian assistance. In Syria, 60% of households reported the household food situation had declined since the arrival period as compared to 46% in Jordan. Food aid receipt was reported by 18.0% of households in Jordan and 90.3% of households in Syria. In Jordan, 10.2% of households received cash assistance and in Syria 25.3% of households received cash assistance. In Jordan, cash assistance was associated with low socioeconomic status, large household size, and UNHCR registration. In Syria, female headed households, Damascus residents, families with children, and those registered with UNHCR were more likely to receive cash assistance. Food insecurity remains a concern among displaced Iraqi households in both Jordan and Syria. Improved targeting of both food and cash assistance and the expansion of cash-based programs could lead to a more effective use of funds and facilitate the implementation of assistance programs that are sustainable in the context of declining funding availability. Copyright © 2010 Elsevier Ltd. All

  16. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    Science.gov (United States)

    2016-01-01

    responsibilities. In turn, she goes on to show the upsurge in sectarian violence since 2003 has intensified gender inequality and the future prospects for...security sector reform; disarmament, demobilisation and reintegration; transition assistance; and disaster response. Consideration of the gendered ...There are two key terms used throughout this literature review that need to be defined from the outset: sex and gender . Sex is the anatomy with which

  17. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  18. Set Up for Failure: The Use of US Security Force Assistance to Prepare Foreign Security Forces for Traditional Combat Operations

    Science.gov (United States)

    2017-05-17

    troops. 69 Ibid., 129. 29 to resist. This is a tension with respect to traditional combat operations; where urgency is high, the preservation...or peace prior to December 1941.”83 MacArthur was known to have a sense of his own infallibility, was confident that he could solve any problem...mind, that end-state changed, and neither army was afforded the time to reach that new end-state. The notion of urgency potentially requiring the

  19. The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000

    Science.gov (United States)

    2000-01-01

    Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions

  20. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  1. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  2. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  3. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  4. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2016-05-01

    Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.

  5. Microstructure-sensitive flow stress modeling for force prediction in laser assisted milling of Inconel 718

    Directory of Open Access Journals (Sweden)

    Pan Zhipeng

    2017-01-01

    Full Text Available Inconel 718 is a typical hard-to-machine material that requires thermally enhanced machining technology such as laser-assisted milling. Based upon finite element analysis, this study simulates the forces in the laser-assisted milling process of Inconel 718 considering the effects of grain growth due to γ' and γ" phases. The γ" phase is unstable and becomes the δ phase, which is likely to precipitate at a temperature over 750 °C. The temperature around the center of spot in the experiments is 850 °C, so the phase transformation and grain growth happen throughout the milling process. In the analysis, this study includes the microstructure evolution while accounting for the effects of dynamic recrystallization and grain growth through the Avrami model. The grain growth reduces the yield stress and flow stress, which improves the machinability. In finite element analysis (FEA, several boundary conditions of temperature varying with time are defined to simulate the movement of laser spot, and the constitutive model is described by Johnson-Cook equation. In experiments, this study collects three sets of cutting forces and finds that the predicted values are in close agreements with measurements especially in feed direction, in which the smallest error is around 5%. In another three simulations, this study also examines the effect of laser preheating on the cutting forces by comparison with a traditional milling process without laser assist. When the laser is off, the forces increase in all cases, which prove the softening effect of laser-assisted milling. In addition, when the axial depth of milling increases, the laser has a more significant influence, especially in axial direction, in which the force with laser is more than 18% smaller than the one without laser. Overall, this study validates the influence of laser-assisted milling on Inconel 718 by predicting the cutting forces in FEA.

  6. How can the West Better Assist Partner Nations in Establishing Internal Security

    Science.gov (United States)

    2017-03-31

    disappointing results. At the heart of this issue is the inability to respond to failures of internal security in partner nations. This essay posits that...Antis, Ph. Deputy Director Joint Advanced War Thesis Advisors: Approved by: Signature: Peter IL Yeager, Colonel! Acting Dean of Faculty and Academic ...of an element of land forces to respond to a new, additional paradigm of war. This essay surveys why helping partner nations build transparent

  7. 3D force control for robotic-assisted beating heart surgery based on viscoelastic tissue model.

    Science.gov (United States)

    Liu, Chao; Moreira, Pedro; Zemiti, Nabil; Poignet, Philippe

    2011-01-01

    Current cardiac surgery faces the challenging problem of heart beating motion even with the help of mechanical stabilizer which makes delicate operation on the heart surface difficult. Motion compensation methods for robotic-assisted beating heart surgery have been proposed recently in literature, but research on force control for such kind of surgery has hardly been reported. Moreover, the viscoelasticity property of the interaction between organ tissue and robotic instrument further complicates the force control design which is much easier in other applications by assuming the interaction model to be elastic (industry, stiff object manipulation, etc.). In this work, we present a three-dimensional force control method for robotic-assisted beating heart surgery taking into consideration of the viscoelastic interaction property. Performance studies based on our D2M2 robot and 3D heart beating motion information obtained through Da Vinci™ system are provided.

  8. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  9. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  10. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  11. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    Science.gov (United States)

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  12. A Vision-Based Approach for Estimating Contact Forces: Applications to Robot-Assisted Surgery

    Directory of Open Access Journals (Sweden)

    C. W. Kennedy

    2005-01-01

    Full Text Available The primary goal of this paper is to provide force feedback to the user using vision-based techniques. The approach presented in this paper can be used to provide force feedback to the surgeon for robot-assisted procedures. As proof of concept, we have developed a linear elastic finite element model (FEM of a rubber membrane whereby the nodal displacements of the membrane points are measured using vision. These nodal displacements are the input into our finite element model. In the first experiment, we track the deformation of the membrane in real-time through stereovision and compare it with the actual deformation computed through forward kinematics of the robot arm. On the basis of accurate deformation estimation through vision, we test the physical model of a membrane developed through finite element techniques. The FEM model accurately reflects the interaction forces on the user console when the interaction forces of the robot arm with the membrane are compared with those experienced by the surgeon on the console through the force feedback device. In the second experiment, the PHANToM haptic interface device is used to control the Mitsubishi PA-10 robot arm and interact with the membrane in real-time. Image data obtained through vision of the deformation of the membrane is used as the displacement input for the FEM model to compute the local interaction forces which are then displayed on the user console for providing force feedback and hence closing the loop.

  13. Integration of force reflection with tactile sensing for minimally invasive robotics-assisted tumor localization.

    Science.gov (United States)

    Talasaz, A; Patel, R V

    2013-01-01

    Tactile sensing and force reflection have been the subject of considerable research for tumor localization in soft-tissue palpation. The work presented in this paper investigates the relevance of force feedback (presented visually as well as directly) during tactile sensing (presented visually only) for tumor localization using an experimental setup close to one that could be applied for real robotics-assisted minimally invasive surgery. The setup is a teleoperated (master-slave) system facilitated with a state-of-the-art minimally invasive probe with a rigidly mounted tactile sensor at the tip and an externally mounted force sensor at the base of the probe. The objective is to capture the tactile information and measure the interaction forces between the probe and tissue during palpation and to explore how they can be integrated to improve the performance of tumor localization. To quantitatively explore the effect of force feedback on tactile sensing tumor localization, several experiments were conducted by human subjects to locate artificial tumors embedded in the ex vivo bovine livers. The results show that using tactile sensing in a force-controlled environment can realize, on average, 57 percent decrease in the maximum force and 55 percent decrease in the average force applied to tissue while increasing the tumor detection accuracy by up to 50 percent compared to the case of using tactile feedback alone. The results also show that while visual presentation of force feedback gives straightforward quantitative measures, improved performance of tactile sensing tumor localization is achieved at the expense of longer times for the user. Also, the quickness and intuitive data mapping of direct force feedback makes it more appealing to experienced users.

  14. Extraction of user's navigation commands from upper body force interaction in walker assisted gait.

    Science.gov (United States)

    Frizera Neto, Anselmo; Gallego, Juan A; Rocon, Eduardo; Pons, José L; Ceres, Ramón

    2010-08-05

    The advances in technology make possible the incorporation of sensors and actuators in rollators, building safer robots and extending the use of walkers to a more diverse population. This paper presents a new method for the extraction of navigation related components from upper-body force interaction data in walker assisted gait. A filtering architecture is designed to cancel: (i) the high-frequency noise caused by vibrations on the walker's structure due to irregularities on the terrain or walker's wheels and (ii) the cadence related force components caused by user's trunk oscillations during gait. As a result, a third component related to user's navigation commands is distinguished. For the cancelation of high-frequency noise, a Benedict-Bordner g-h filter was designed presenting very low values for Kinematic Tracking Error ((2.035 +/- 0.358).10(-2) kgf) and delay ((1.897 +/- 0.3697).10(1)ms). A Fourier Linear Combiner filtering architecture was implemented for the adaptive attenuation of about 80% of the cadence related components' energy from force data. This was done without compromising the information contained in the frequencies close to such notch filters. The presented methodology offers an effective cancelation of the undesired components from force data, allowing the system to extract in real-time voluntary user's navigation commands. Based on this real-time identification of voluntary user's commands, a classical approach to the control architecture of the robotic walker is being developed, in order to obtain stable and safe user assisted locomotion.

  15. In-vitro analysis of forces in conventional and ultrasonically assisted drilling of bone.

    Science.gov (United States)

    Alam, K; Hassan, Edris; Imran, Syed Husain; Khan, Mushtaq

    2016-05-12

    Drilling of bone is widely performed in orthopaedics for repair and reconstruction of bone. Current paper is focused on the efforts to minimize force generation during the drilling process. Ultrasonically Assisted Drilling (UAD) is a possible option to replace Conventional Drilling (CD) in bone surgical procedures. The purpose of this study was to investigate and analyze the effect of drilling parameters and ultrasonic parameters on the level of drilling thrust force in the presence of water irrigation. Drilling tests were performed on young bovine femoral bone using different parameters such as spindle speeds, feed rates, coolant flow rates, frequency and amplitudes of vibrations. The drilling force was significantly dropped with increase in drill rotation speed in both types of drilling. Increase in feed rate was more influential in raising the drilling force in CD compared to UAD. The force was significantly dropped when ultrasonic vibrations up to 10 kHz were imposed on the drill. The drill force was found to be unaffected by the range of amplitudes and the amount of water supplied to the drilling region in UAD. Low frequency vibrations with irrigation can be successfully used for safe and efficient drilling in bone.

  16. Towards Robot-Assisted Retinal Vein Cannulation: A Motorized Force-Sensing Microneedle Integrated with a Handheld Micromanipulator †.

    Science.gov (United States)

    Gonenc, Berk; Chae, Jeremy; Gehlbach, Peter; Taylor, Russell H; Iordachita, Iulian

    2017-09-23

    Retinal vein cannulation is a technically demanding surgical procedure where therapeutic agents are injected into the retinal veins to treat occlusions. The clinical feasibility of this approach has been largely limited by the technical challenges associated with performing the procedure. Among the challenges to successful vein cannulation are identifying the moment of venous puncture, achieving cannulation of the micro-vessel, and maintaining cannulation throughout drug delivery. Recent advances in medical robotics and sensing of tool-tissue interaction forces have the potential to address each of these challenges as well as to prevent tissue trauma, minimize complications, diminish surgeon effort, and ultimately promote successful retinal vein cannulation. In this paper, we develop an assistive system combining a handheld micromanipulator, called "Micron", with a force-sensing microneedle. Using this system, we examine two distinct methods of precisely detecting the instant of venous puncture. This is based on measured tool-tissue interaction forces and also the tracked position of the needle tip. In addition to the existing tremor canceling function of Micron, a new control method is implemented to actively compensate unintended movements of the operator, and to keep the cannulation device securely inside the vein following cannulation. To demonstrate the capabilities and performance of our uniquely upgraded system, we present a multi-user artificial phantom study with subjects from three different surgical skill levels. Results show that our puncture detection algorithm, when combined with the active positive holding feature enables sustained cannulation which is most evident in smaller veins. Notable is that the active holding function significantly attenuates tool motion in the vein, thereby reduces the trauma during cannulation.

  17. Towards Robot-Assisted Retinal Vein Cannulation: A Motorized Force-Sensing Microneedle Integrated with a Handheld Micromanipulator †

    Science.gov (United States)

    Gonenc, Berk; Chae, Jeremy; Gehlbach, Peter; Taylor, Russell H.; Iordachita, Iulian

    2017-01-01

    Retinal vein cannulation is a technically demanding surgical procedure where therapeutic agents are injected into the retinal veins to treat occlusions. The clinical feasibility of this approach has been largely limited by the technical challenges associated with performing the procedure. Among the challenges to successful vein cannulation are identifying the moment of venous puncture, achieving cannulation of the micro-vessel, and maintaining cannulation throughout drug delivery. Recent advances in medical robotics and sensing of tool-tissue interaction forces have the potential to address each of these challenges as well as to prevent tissue trauma, minimize complications, diminish surgeon effort, and ultimately promote successful retinal vein cannulation. In this paper, we develop an assistive system combining a handheld micromanipulator, called “Micron”, with a force-sensing microneedle. Using this system, we examine two distinct methods of precisely detecting the instant of venous puncture. This is based on measured tool-tissue interaction forces and also the tracked position of the needle tip. In addition to the existing tremor canceling function of Micron, a new control method is implemented to actively compensate unintended movements of the operator, and to keep the cannulation device securely inside the vein following cannulation. To demonstrate the capabilities and performance of our uniquely upgraded system, we present a multi-user artificial phantom study with subjects from three different surgical skill levels. Results show that our puncture detection algorithm, when combined with the active positive holding feature enables sustained cannulation which is most evident in smaller veins. Notable is that the active holding function significantly attenuates tool motion in the vein, thereby reduces the trauma during cannulation. PMID:28946634

  18. How operator admittance affects the response of a teleoperation system to assistive forces – A model analytic study and simulation

    International Nuclear Information System (INIS)

    Wildenbeest, J.G.W.; Abbink, D.A.; Boessenkool, H.; Heemskerk, C.J.M.; Koning, J.F.

    2013-01-01

    Highlights: ► We developed a computational model of a human operator controlling a teleoperation system based on feedforward control, while performing a free-space motion. ► We studied how assistive forces affect the response of the combined system of telemanipulator and operator, when operator admittance changes due to task instruction or arm configuration. ► Inappropriate assistive forces can lead to assistive forces that are either not perceived, or deflect the combined system; assistive forces should be tailored to operator admittance. ► It is required to study, measure and quantitatively model operator behavior for teleoperated tasks in more detail. -- Abstract: Haptic shared control is a promising approach to increase the effectiveness of remote handling operations. While in haptic shared control the operator is continuously guided with assistive forces, the operator's response to forces is not fully understood. This study describes the development of a computational model of a human operator controlling a teleoperation system based on feedforward control. In a simulation, the operator's response to repulsive forces in free-space motions was modeled for two degrees of freedom, for two operator endpoint admittances (estimated by means of closed-loop identification techniques). The simulation results show that similar repulsive forces lead to substantial discrepancies in response when admittance settings mismatch; wrongly estimated operator admittances can lead to assistive forces that are either not perceived, or deflect the combined system of human operator and telemanipulator. It is concluded that assistive forces should be tailored to the arm configuration and the type of task performed. In order to utilize haptic shared control to its full potential, it is required to study, measure and quantitatively model operator behavior for teleoperated tasks in more detail

  19. How operator admittance affects the response of a teleoperation system to assistive forces – A model analytic study and simulation

    Energy Technology Data Exchange (ETDEWEB)

    Wildenbeest, J.G.W., E-mail: j.g.w.wildenbeest@tudelft.nl [Department of Biomechanical Engineering, Delft University of Technology, Mekelweg 2, 2626 CD Delft (Netherlands); Heemskerk Innovative Technology B.V., Jonckerweg 12, 2201 DZ Noordwijk (Netherlands); Abbink, D.A. [Department of Biomechanical Engineering, Delft University of Technology, Mekelweg 2, 2626 CD Delft (Netherlands); Boessenkool, H. [FOM Institute DIFFER (Dutch Institute of Fundamental Energy Research), Association EUROTOM-FOM, Partner in the Trilateral Eurogio Cluster, P.O. Box 1207, 3430 BE Nieuwegein (Netherlands); Heemskerk, C.J.M.; Koning, J.F. [Heemskerk Innovative Technology B.V., Jonckerweg 12, 2201 DZ Noordwijk (Netherlands); FOM Institute DIFFER (Dutch Institute of Fundamental Energy Research), Association EUROTOM-FOM, Partner in the Trilateral Eurogio Cluster, P.O. Box 1207, 3430 BE Nieuwegein (Netherlands)

    2013-10-15

    Highlights: ► We developed a computational model of a human operator controlling a teleoperation system based on feedforward control, while performing a free-space motion. ► We studied how assistive forces affect the response of the combined system of telemanipulator and operator, when operator admittance changes due to task instruction or arm configuration. ► Inappropriate assistive forces can lead to assistive forces that are either not perceived, or deflect the combined system; assistive forces should be tailored to operator admittance. ► It is required to study, measure and quantitatively model operator behavior for teleoperated tasks in more detail. -- Abstract: Haptic shared control is a promising approach to increase the effectiveness of remote handling operations. While in haptic shared control the operator is continuously guided with assistive forces, the operator's response to forces is not fully understood. This study describes the development of a computational model of a human operator controlling a teleoperation system based on feedforward control. In a simulation, the operator's response to repulsive forces in free-space motions was modeled for two degrees of freedom, for two operator endpoint admittances (estimated by means of closed-loop identification techniques). The simulation results show that similar repulsive forces lead to substantial discrepancies in response when admittance settings mismatch; wrongly estimated operator admittances can lead to assistive forces that are either not perceived, or deflect the combined system of human operator and telemanipulator. It is concluded that assistive forces should be tailored to the arm configuration and the type of task performed. In order to utilize haptic shared control to its full potential, it is required to study, measure and quantitatively model operator behavior for teleoperated tasks in more detail.

  20. An actuated force feedback-enabled laparoscopic instrument for robotic-assisted surgery.

    Science.gov (United States)

    Moradi Dalvand, Mohsen; Shirinzadeh, Bijan; Shamdani, Amir Hossein; Smith, Julian; Zhong, Yongmin

    2014-03-01

    Robotic-assisted minimally invasive surgery systems not only have the advantages of traditional laparoscopic instruments but also have other important advantages, including restoring the surgeon's hand-eye coordination and improving the surgeon's precision by filtering hand tremors. Unfortunately, these benefits have come at the expense of the surgeon's ability to feel. Various solutions for restoring this feature have been proposed. An actuated modular force feedback-enabled laparoscopic instrument was proposed that is able to measure tip-tissue lateral interaction forces as well as normal grasping forces. The instrument has also the capability to adjust the grasping direction inside the patient body. In order to measure the interaction forces, strain gauges were employed. A series of finite element analyses were performed to gain an understanding of the actual magnitude of surface strains where gauges are applied. The strain gauge bridge configurations were calibrated. A series of experiments was conducted and the results were analysed. The modularity feature of the proposed instrument makes it interchangeable between various tip types of different functionalities (e.g. cutter, grasper, dissector). Calibration results of the strain gauges incorporated into the tube and at the base of the instrument presented the monotonic responses for these strain gauge configurations. Experimental results from tissue probing and tissue characterization experiments verified the capability of the proposed instrument in measuring lateral probing forces and characterizing artificial tissue samples of varying stiffness. The proposed instrument can improve the quality of palpation and characterization of soft tissues of varying stiffness by restoring sense of touch in robotic assisted minimally invasive surgery operations. Copyright © 2013 John Wiley & Sons, Ltd.

  1. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  2. Security Assistance in Nigeria: Shaping the International Environment to Meet U.S. National Security Objectives in the Global Era

    National Research Council Canada - National Science Library

    Prendergast, Kenneth

    2003-01-01

    .... While American interests in Sub-Saharan Africa are significant and growing, there are also important transnational security threats, infectious diseases, organized international criminal activities...

  3. Atomic force microscope-assisted scanning tunneling spectroscopy under ambient conditions.

    Science.gov (United States)

    Vakhshouri, Amin; Hashimoto, Katsushi; Hirayama, Yoshiro

    2014-12-01

    We have developed a method of atomic force microscopy (AFM)-assisted scanning tunneling spectroscopy (STS) under ambient conditions. An AFM function is used for rapid access to a selected position prior to performing STS. The AFM feedback is further used to suppress vertical thermal drift of the tip-sample distance during spectroscopy, enabling flexible and stable spectroscopy measurements at room temperature. © The Author 2014. Published by Oxford University Press on behalf of The Japanese Society of Microscopy. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. Study on optimization design of superconducting magnet for magnetic force assisted drug delivery system

    International Nuclear Information System (INIS)

    Fukui, S.; Abe, R.; Ogawa, J.; Oka, T.; Yamaguchi, M.; Sato, T.; Imaizumi, H.

    2007-01-01

    Analytical study on the design of the superconducting magnet for the magnetic force assisted drug delivery system is presented in this paper. The necessary magnetic field condition to reside the magnetic drug particle in the blood vessels is determined by analyzing the particle motion in the blood vessel. The design procedure of the superconducting magnet for the M-DDS is presented and some case studies are conducted. The analytical results show that the superconducting magnet to satisfy the magnetic field conduction for the M-DDS is practically feasible

  5. Extraction of user's navigation commands from upper body force interaction in walker assisted gait

    Directory of Open Access Journals (Sweden)

    Pons José L

    2010-08-01

    Full Text Available Abstract Background The advances in technology make possible the incorporation of sensors and actuators in rollators, building safer robots and extending the use of walkers to a more diverse population. This paper presents a new method for the extraction of navigation related components from upper-body force interaction data in walker assisted gait. A filtering architecture is designed to cancel: (i the high-frequency noise caused by vibrations on the walker's structure due to irregularities on the terrain or walker's wheels and (ii the cadence related force components caused by user's trunk oscillations during gait. As a result, a third component related to user's navigation commands is distinguished. Results For the cancelation of high-frequency noise, a Benedict-Bordner g-h filter was designed presenting very low values for Kinematic Tracking Error ((2.035 ± 0.358·10-2 kgf and delay ((1.897 ± 0.3697·101ms. A Fourier Linear Combiner filtering architecture was implemented for the adaptive attenuation of about 80% of the cadence related components' energy from force data. This was done without compromising the information contained in the frequencies close to such notch filters. Conclusions The presented methodology offers an effective cancelation of the undesired components from force data, allowing the system to extract in real-time voluntary user's navigation commands. Based on this real-time identification of voluntary user's commands, a classical approach to the control architecture of the robotic walker is being developed, in order to obtain stable and safe user assisted locomotion.

  6. Fifty-Four Durand Lines: The Importance of Persistent Security Assistance in Africa

    Directory of Open Access Journals (Sweden)

    Whitney Grespin

    2013-07-01

    Full Text Available The US has long faced criticism about being a ‘fair weather friend’ to foreign states only as it suits current policy interests. Such inconsistent engagement results in opportunity costs that are both fiscally draining and damaging to US social and political capital. US defense, development, and diplomatic establishments can more easily realize progress and encourage positive forward movement with African states by initiating and maintaining more consistent collaboration with foreign nation representatives. An increased commitment to persistent engagement will be especially important for the Department of Defense, which has been sharply criticized for its heavy-handedness when partnering with foreign security forces over the past decade. As the international community has observed through recent events across the African continent, it is important that the US government conduct policy planning and operations with a mind to building long-term relationships rather than dabbling in flings and ill-suited one night stands. This is particularly important with programs that involve potentially sensitive knowledge and skills transfers, such as the military reform and security force capacity building that the US has favored more heavily as of late. As the US continues to shift from heavy presence, high-visibility interventions to more subtle and nuanced capacity enhancement initiatives, government representatives will need to rely less on muscle and more on craft. The type of work that is required to truly effect change and build durable institutional relationships is hard, slow, and methodical work that does not lend itself to a quick fix.

  7. Fluid force predictions and experimental measurements for a magnetically levitated pediatric ventricular assist device.

    Science.gov (United States)

    Throckmorton, Amy L; Untaroiu, Alexandrina; Lim, D Scott; Wood, Houston G; Allaire, Paul E

    2007-05-01

    The latest generation of artificial blood pumps incorporates the use of magnetic bearings to levitate the rotating component of the pump, the impeller. A magnetic suspension prevents the rotating impeller from contacting the internal surfaces of the pump and reduces regions of stagnant and high shear flow that surround fluid or mechanical bearings. Applying this third-generation technology, the Virginia Artificial Heart Institute has developed a ventricular assist device (VAD) to support infants and children. In consideration of the suspension design, the axial and radial fluid forces exerted on the rotor of the pediatric VAD were estimated using computational fluid dynamics (CFD) such that fluid perturbations would be counterbalanced. In addition, a prototype was built for experimental measurements of the axial fluid forces and estimations of the radial fluid forces during operation using a blood analog mixture. The axial fluid forces for a centered impeller position were found to range from 0.5 +/- 0.01 to 1 +/- 0.02 N in magnitude for 0.5 +/- 0.095 to 3.5 +/- 0.164 Lpm over rotational speeds of 6110 +/- 0.39 to 8030 +/- 0.57% rpm. The CFD predictions for the axial forces deviated from the experimental data by approximately 8.5% with a maximum difference of 18% at higher flow rates. Similarly for the off-centered impeller conditions, the maximum radial fluid force along the y-axis was found to be -0.57 +/- 0.17 N. The maximum cross-coupling force in the x direction was found to be larger with a maximum value of 0.74 +/- 0.22 N. This resulted in a 25-35% overestimate of the radial fluid force as compared to the CFD predictions; this overestimation will lead to a far more robust magnetic suspension design. The axial and radial forces estimated from the computational results are well within a range over which a compact magnetic suspension can compensate for flow perturbations. This study also serves as an effective and novel design methodology for blood pump

  8. Human-Robot Interaction: Does Robotic Guidance Force Affect Gait-Related Brain Dynamics during Robot-Assisted Treadmill Walking?

    Directory of Open Access Journals (Sweden)

    Kristel Knaepen

    Full Text Available In order to determine optimal training parameters for robot-assisted treadmill walking, it is essential to understand how a robotic device interacts with its wearer, and thus, how parameter settings of the device affect locomotor control. The aim of this study was to assess the effect of different levels of guidance force during robot-assisted treadmill walking on cortical activity. Eighteen healthy subjects walked at 2 km.h-1 on a treadmill with and without assistance of the Lokomat robotic gait orthosis. Event-related spectral perturbations and changes in power spectral density were investigated during unassisted treadmill walking as well as during robot-assisted treadmill walking at 30%, 60% and 100% guidance force (with 0% body weight support. Clustering of independent components revealed three clusters of activity in the sensorimotor cortex during treadmill walking and robot-assisted treadmill walking in healthy subjects. These clusters demonstrated gait-related spectral modulations in the mu, beta and low gamma bands over the sensorimotor cortex related to specific phases of the gait cycle. Moreover, mu and beta rhythms were suppressed in the right primary sensory cortex during treadmill walking compared to robot-assisted treadmill walking with 100% guidance force, indicating significantly larger involvement of the sensorimotor area during treadmill walking compared to robot-assisted treadmill walking. Only marginal differences in the spectral power of the mu, beta and low gamma bands could be identified between robot-assisted treadmill walking with different levels of guidance force. From these results it can be concluded that a high level of guidance force (i.e., 100% guidance force and thus a less active participation during locomotion should be avoided during robot-assisted treadmill walking. This will optimize the involvement of the sensorimotor cortex which is known to be crucial for motor learning.

  9. Human-Robot Interaction: Does Robotic Guidance Force Affect Gait-Related Brain Dynamics during Robot-Assisted Treadmill Walking?

    Science.gov (United States)

    Knaepen, Kristel; Mierau, Andreas; Swinnen, Eva; Fernandez Tellez, Helio; Michielsen, Marc; Kerckhofs, Eric; Lefeber, Dirk; Meeusen, Romain

    2015-01-01

    In order to determine optimal training parameters for robot-assisted treadmill walking, it is essential to understand how a robotic device interacts with its wearer, and thus, how parameter settings of the device affect locomotor control. The aim of this study was to assess the effect of different levels of guidance force during robot-assisted treadmill walking on cortical activity. Eighteen healthy subjects walked at 2 km.h-1 on a treadmill with and without assistance of the Lokomat robotic gait orthosis. Event-related spectral perturbations and changes in power spectral density were investigated during unassisted treadmill walking as well as during robot-assisted treadmill walking at 30%, 60% and 100% guidance force (with 0% body weight support). Clustering of independent components revealed three clusters of activity in the sensorimotor cortex during treadmill walking and robot-assisted treadmill walking in healthy subjects. These clusters demonstrated gait-related spectral modulations in the mu, beta and low gamma bands over the sensorimotor cortex related to specific phases of the gait cycle. Moreover, mu and beta rhythms were suppressed in the right primary sensory cortex during treadmill walking compared to robot-assisted treadmill walking with 100% guidance force, indicating significantly larger involvement of the sensorimotor area during treadmill walking compared to robot-assisted treadmill walking. Only marginal differences in the spectral power of the mu, beta and low gamma bands could be identified between robot-assisted treadmill walking with different levels of guidance force. From these results it can be concluded that a high level of guidance force (i.e., 100% guidance force) and thus a less active participation during locomotion should be avoided during robot-assisted treadmill walking. This will optimize the involvement of the sensorimotor cortex which is known to be crucial for motor learning.

  10. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  11. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  12. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Science.gov (United States)

    2010-07-01

    ..., foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense... § 728.44 Members of security assistance training programs, foreign military sales, and their ITO... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...

  13. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  14. Preliminary analysis of force-torque measurements for robot-assisted fracture surgery.

    Science.gov (United States)

    Georgilas, Ioannis; Dagnino, Giulio; Tarassoli, Payam; Atkins, Roger; Dogramadzi, Sanja

    2015-08-01

    Our group at Bristol Robotics Laboratory has been working on a new robotic system for fracture surgery that has been previously reported [1]. The robotic system is being developed for distal femur fractures and features a robot that manipulates the small fracture fragments through small percutaneous incisions and a robot that re-aligns the long bones. The robots controller design relies on accurate and bounded force and position parameters for which we require real surgical data. This paper reports preliminary findings of forces and torques applied during bone and soft tissue manipulation in typical orthopaedic surgery procedures. Using customised orthopaedic surgical tools we have collected data from a range of orthopaedic surgical procedures at Bristol Royal Infirmary, UK. Maximum forces and torques encountered during fracture manipulation which involved proximal femur and soft tissue distraction around it and reduction of neck of femur fractures have been recorded and further analysed in conjunction with accompanying image recordings. Using this data we are establishing a set of technical requirements for creating safe and dynamically stable minimally invasive robot-assisted fracture surgery (RAFS) systems.

  15. Force Modeling, Identification, and Feedback Control of Robot-Assisted Needle Insertion: A Survey of the Literature

    Directory of Open Access Journals (Sweden)

    Chongjun Yang

    2018-02-01

    Full Text Available Robot-assisted surgery is of growing interest in the surgical and engineering communities. The use of robots allows surgery to be performed with precision using smaller instruments and incisions, resulting in shorter healing times. However, using current technology, an operator cannot directly feel the operation because the surgeon-instrument and instrument-tissue interaction force feedbacks are lost during needle insertion. Advancements in force feedback and control not only help reduce tissue deformation and needle deflection but also provide the surgeon with better control over the surgical instruments. The goal of this review is to summarize the key components surrounding the force feedback and control during robot-assisted needle insertion. The literature search was conducted during the middle months of 2017 using mainstream academic search engines with a combination of keywords relevant to the field. In total, 166 articles with valuable contents were analyzed and grouped into five related topics. This survey systemically summarizes the state-of-the-art force control technologies for robot-assisted needle insertion, such as force modeling, measurement, the factors that influence the interaction force, parameter identification, and force control algorithms. All studies show force control is still at its initial stage. The influence factors, needle deflection or planning remain open for investigation in future.

  16. Force Modeling, Identification, and Feedback Control of Robot-Assisted Needle Insertion: A Survey of the Literature.

    Science.gov (United States)

    Yang, Chongjun; Xie, Yu; Liu, Shuang; Sun, Dong

    2018-02-12

    Robot-assisted surgery is of growing interest in the surgical and engineering communities. The use of robots allows surgery to be performed with precision using smaller instruments and incisions, resulting in shorter healing times. However, using current technology, an operator cannot directly feel the operation because the surgeon-instrument and instrument-tissue interaction force feedbacks are lost during needle insertion. Advancements in force feedback and control not only help reduce tissue deformation and needle deflection but also provide the surgeon with better control over the surgical instruments. The goal of this review is to summarize the key components surrounding the force feedback and control during robot-assisted needle insertion. The literature search was conducted during the middle months of 2017 using mainstream academic search engines with a combination of keywords relevant to the field. In total, 166 articles with valuable contents were analyzed and grouped into five related topics. This survey systemically summarizes the state-of-the-art force control technologies for robot-assisted needle insertion, such as force modeling, measurement, the factors that influence the interaction force, parameter identification, and force control algorithms. All studies show force control is still at its initial stage. The influence factors, needle deflection or planning remain open for investigation in future.

  17. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  18. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  19. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase

    International Nuclear Information System (INIS)

    Chen, Wen; Chen, Xudong; Wang, Xiaogang

    2015-01-01

    We propose a method for security-enhanced phase encryption assisted by a nonlinear optical correlation via a sparse phase. Optical configurations are established based on a phase retrieval algorithm for embedding an input image and the secret data into phase-only masks. We found that when one or a few phase-only masks generated during data hiding are sparse, it is possible to integrate these sparse masks into those phase-only masks generated during the encoding of the input image. Synthesized phase-only masks are used for the recovery, and sparse distributions (i.e., binary maps) for generating the incomplete phase-only masks are considered as additional parameters for the recovery of secret data. It is difficult for unauthorized receivers to know that a useful phase has been sparsely distributed in the finally generated phase-only masks for secret-data recovery. Only when the secret data are correctly verified can the input image obtained with valid keys be claimed as targeted information. (paper)

  20. Robot-assisted walking with the Lokomat: the influence of different levels of guidance force on thorax and pelvis kinematics.

    Science.gov (United States)

    Swinnen, Eva; Baeyens, Jean-Pierre; Knaepen, Kristel; Michielsen, Marc; Clijsen, Ron; Beckwée, David; Kerckhofs, Eric

    2015-03-01

    Little attention has been devoted to the thorax and pelvis movements during gait. The aim of this study is to compare differences in the thorax and pelvis kinematics during unassisted walking on a treadmill and during walking with robot assistance (Lokomat-system (Hocoma, Volketswil, Switzerland)). 18 healthy persons walked on a treadmill with and without the Lokomat system at 2kmph. Three different conditions of guidance force (30%, 60% and 100%) were used during robot-assisted treadmill walking (30% body weight support). The maximal movement amplitudes of the thorax and pelvis were measured (Polhemus Liberty™ (Polhemus, Colchester, Vermont, USA) (240/16)). A repeated measurement ANOVA was conducted. Robot-assisted treadmill walking with different levels of guidance force showed significantly smaller maximal movement amplitudes for thorax and pelvis, compared to treadmill walking. Only the antero-posterior tilting of the pelvis was significantly increased during robot-assisted treadmill walking compared to treadmill walking. No significant changes of kinematic parameters were found between the different levels of guidance force. With regard to the thorax and pelvis movements, robot-assisted treadmill walking is significantly different compared to treadmill walking. It can be concluded that when using robot assistance, the thorax is stimulated in a different way than during walking without robot assistance, influencing the balance training during gait. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  2. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  3. Site-controlled quantum dots fabricated using an atomic-force microscope assisted technique

    Directory of Open Access Journals (Sweden)

    Sakuma Y

    2006-01-01

    Full Text Available AbstractAn atomic-force microscope assisted technique is developed to control the position and size of self-assembled semiconductor quantum dots (QDs. Presently, the site precision is as good as ± 1.5 nm and the size fluctuation is within ± 5% with the minimum controllable lateral diameter of 20 nm. With the ability of producing tightly packed and differently sized QDs, sophisticated QD arrays can be controllably fabricated for the application in quantum computing. The optical quality of such site-controlled QDs is found comparable to some conventionally self-assembled semiconductor QDs. The single dot photoluminescence of site-controlled InAs/InP QDs is studied in detail, presenting the prospect to utilize them in quantum communication as precisely controlled single photon emitters working at telecommunication bands.

  4. Photo-assisted local oxidation of GaN using an atomic force microscope

    International Nuclear Information System (INIS)

    Hwang, J S; Hu, Z S; Lu, T Y; Chen, L W; Chen, S W; Lin, T Y; Hsiao, C-L; Chen, K-H; Chen, L-C

    2006-01-01

    This paper introduces a photo-assisted atomic force microscope (AFM) local oxidation technique which is capable of producing highly smooth oxide patterns with heights reaching several tens of nanometres on both n- and p-types of GaN (and in principle on most semiconductors) without the use of chemicals. The novel methodology relies on UV illumination of the surface of the substrate during conventional AFM local oxidation. A low 1.2 V threshold voltage for n-type GaN was obtained, which can be explained by UV photo-generation of excess electron-hole pairs in the substrate near the junction, thereby reducing the electric field required to drive carrier flow through the tip-sample Schottky barrier. It was demonstrated that the presence or absence of light alone was sufficient to switch the growth of the oxide on or off. The photo-assisted AFM oxidation technique is of immediate interest to the semiconductor industry for the fabrication of GaN-based complementary metal-oxide-semiconductor devices and nanodevices, improves chances for AFM-type data storage, and presents new degrees of freedom for process control technique

  5. Capillary-Force-Assisted Clean-Stamp Transfer of Two-Dimensional Materials.

    Science.gov (United States)

    Ma, Xuezhi; Liu, Qiushi; Xu, Da; Zhu, Yangzhi; Kim, Sanggon; Cui, Yongtao; Zhong, Lanlan; Liu, Ming

    2017-11-08

    A simple and clean method of transferring two-dimensional (2D) materials plays a critical role in the fabrication of 2D electronics, particularly the heterostructure devices based on the artificial vertical stacking of various 2D crystals. Currently, clean transfer techniques rely on sacrificial layers or bulky crystal flakes (e.g., hexagonal boron nitride) to pick up the 2D materials. Here, we develop a capillary-force-assisted clean-stamp technique that uses a thin layer of evaporative liquid (e.g., water) as an instant glue to increase the adhesion energy between 2D crystals and polydimethylsiloxane (PDMS) for the pick-up step. After the liquid evaporates, the adhesion energy decreases, and the 2D crystal can be released. The thin liquid layer is condensed to the PDMS surface from its vapor phase, which ensures the low contamination level on the 2D materials and largely remains their chemical and electrical properties. Using this method, we prepared graphene-based transistors with low charge-neutral concentration (3 × 10 10 cm -2 ) and high carrier mobility (up to 48 820 cm 2 V -1 s -1 at room temperature) and heterostructure optoelectronics with high operation speed. Finally, a capillary-force model is developed to explain the experiment.

  6. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  7. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2008-01-01

    ...? This paper analyzes this construct and provides a framework for identifying proponency, institutionalizing lessons learned from OIF and OEF as well as providing military, police and governance...

  8. Korean Military Advisory Group: Insights for Future Security Force Assistance Efforts

    Science.gov (United States)

    2011-06-10

    Battalion MiTT Rank Brigade MiTT Rank Division MiTT Rank Team Chief Maneuver, Fires, and Effects ( MFE ) Major Lieutenant Colonel Lieutenant...Colonel (Promotable) or Colonel Staff Maneuver Trainer MFE Captain Major Lieutenant Colonel Intelligence Trainer Operational Support (OS...Field Artillery Effects Advisor MFE Captain Captain Major Intelligence NCO Trainer OS Master Sergeant Master Sergeant Master Sergeant Logistics NCO

  9. A Security Assistance Example: The U.S. Air Force and the African Coastal Security Program. CLIC Papers

    Science.gov (United States)

    1989-04-01

    Civic Action in Honduras, 1982-1985 A205 084 CompiLation of LIC References and Bibliography, Vol i A205 086 PsychoLogicaL Strategies In LIC Arms...a military school and on training and maintaining 5 a paracommando battalion, located at Atar . Both projects are intended to make the Mauritanian...impunity for years. The GARIM has practically no capability to move troops in a timely manner from an air base at Atar to several airstrips along its long

  10. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  11. Polarity analysis of GaN nanorods by photo-assisted Kelvin probe force microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Jiandong; Neumann, Richard; Wang, Xue; Li, Shunfeng; Fuendling, Soenke; Merzsch, Stephan; Al-Suleiman, Mohamed A.M.; Soekmen, Uensal; Wehmann, Hergo-H.; Waag, Andreas [Institut fuer Halbleitertechnik, TU Braunschweig (Germany)

    2011-07-15

    Polarity dependence (N-polar (000-1) and Ga-polar (0001)) of surface photovoltage of epitaxially grown, vertically aligned GaN nanorods has been investigated by photo-assisted Kelvin probe force microscopy (KPFM). Commercial GaN substrates with known polarities are taken as reference samples. The polarity of GaN substrates can be well distinguished by the change in surface photovoltage upon UV illumination in air ambient. These different behaviors of Ga- and N-polar surfaces are attributed to the polarity-related surface-bound charges and photochemical reactivity. GaN nanorods were grown on patterned SiO{sub 2}/sapphire templates by metal-organic vapor phase epitaxy (MOVPE). In order to analyze the bottom surface of the grown GaN nanorods, a technique known from high power electronics and joining techniques is applied to remove the substrate. The top and bottom surfaces of the GaN nanorods are identified to be N-polar and Ga-polar according to the KPFM results, respectively. Our experiments demonstrate that KPFM is a simple and suitable method capable to identify the polarity of GaN nanorods. (copyright 2011 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  12. Customized atomic force microscopy probe by focused-ion-beam-assisted tip transfer

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Andrew; Butte, Manish J., E-mail: manish.butte@stanford.edu [Department of Pediatrics, Division of Immunology, Allergy and Rheumatology, Stanford University, Stanford, California 94305 (United States)

    2014-08-04

    We present a technique for transferring separately fabricated tips onto tipless atomic force microscopy (AFM) cantilevers, performed using focused ion beam-assisted nanomanipulation. This method addresses the need in scanning probe microscopy for certain tip geometries that cannot be achieved by conventional lithography. For example, in probing complex layered materials or tall biological cells using AFM, a tall tip with a high-aspect-ratio is required to avoid artifacts caused by collisions of the tip's sides with the material being probed. We show experimentally that tall (18 μm) cantilever tips fabricated by this approach reduce squeeze-film damping, which fits predictions from hydrodynamic theory, and results in an increased quality factor (Q) of the fundamental flexural mode. We demonstrate that a customized tip's well-defined geometry, tall tip height, and aspect ratio enable improved measurement of elastic moduli by allowing access to low-laying portions of tall cells (T lymphocytes). This technique can be generally used to attach tips to any micromechanical device when conventional lithography of tips cannot be accomplished.

  13. Exploring the effects of dimensionality reduction in deep networks for force estimation in robotic-assisted surgery

    Science.gov (United States)

    Aviles, Angelica I.; Alsaleh, Samar; Sobrevilla, Pilar; Casals, Alicia

    2016-03-01

    Robotic-Assisted Surgery approach overcomes the limitations of the traditional laparoscopic and open surgeries. However, one of its major limitations is the lack of force feedback. Since there is no direct interaction between the surgeon and the tissue, there is no way of knowing how much force the surgeon is applying which can result in irreversible injuries. The use of force sensors is not practical since they impose different constraints. Thus, we make use of a neuro-visual approach to estimate the applied forces, in which the 3D shape recovery together with the geometry of motion are used as input to a deep network based on LSTM-RNN architecture. When deep networks are used in real time, pre-processing of data is a key factor to reduce complexity and improve the network performance. A common pre-processing step is dimensionality reduction which attempts to eliminate redundant and insignificant information by selecting a subset of relevant features to use in model construction. In this work, we show the effects of dimensionality reduction in a real-time application: estimating the applied force in Robotic-Assisted Surgeries. According to the results, we demonstrated positive effects of doing dimensionality reduction on deep networks including: faster training, improved network performance, and overfitting prevention. We also show a significant accuracy improvement, ranging from about 33% to 86%, over existing approaches related to force estimation.

  14. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  15. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  16. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  17. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  18. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  19. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  20. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  1. DeviceGuard: External Device-Assisted System And Data Security

    OpenAIRE

    Deng, Yipan

    2011-01-01

    This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such as anti-virus scanning protect the host from virus, worms, Trojans and other malwares. One of the issues of the host-based security approaches is that when the operating system is compromised by the malware, the antivirus software also becomes vulnerable. In this thesis, we present a novel approach through usin...

  2. UV-assisted capillary force lithography for engineering biomimetic multiscale hierarchical structures: From lotus leaf to gecko foot hairs

    KAUST Repository

    Jeong, Hoon Eui; Kwak, Rhokyun; Khademhosseini, Ali; Suh, Kahp Y.

    2009-01-01

    This feature article provides an overview of the recently developed two-step UV-assisted capillary force lithography and its application to fabricating well-defined micro/nanoscale hierarchical structures. This method utilizes an oxygen inhibition effect in the course of UV irradiation curing and a two-step moulding process, to form multiscale hierarchical or suspended nanobridge structures in a rapid and reproducible manner. After a brief description of the fabrication principles, several examples of the two-step UV-assisted moulding technique are presented. In addition, emerging applications of the multiscale hierarchical structures are briefly described. © The Royal Society of Chemistry 2009.

  3. Maximum dislodging forces of mandibular implant-assisted removable partial dentures: in vitro assessment.

    Science.gov (United States)

    Gharehchahi, Jafar; Asadzadeh, Nafiseh; Mirmortazavi, Amirtaher; Shakeri, Mohammad Taghi

    2013-10-01

    The initial retention of implant-assisted removable partial dentures (IARPDs) is unknown. The purpose of this in vitro study was to compare maximum dislodging forces of distal extension mandibular IARPD with two different attachments and three clasp designs. A simulated class I partially edentulous mandible was prepared with two screw-type 3.75 × 12 mm implants in the first molar regions and 2 metal-ceramic crowns on distal abutments. Fifteen bilateral distal extension frameworks were conventionally fabricated in three clasp designs (suprabulge, infrabulge, no clasp). Locator attachments were connected to the 15 denture bases with autopolymerized resin. Each specimen was subject to four types of retention pulls (main, anterior, posterior, unilateral pull) five times with a universal testing machine. Locator attachments were replaced with O-ring attachments, and the same procedure was performed. Therefore, the study groups included: IRPD with Locator attachment and suprabulge clasp (group 1), IRPD with Locator attachment and infrabulge clasp (group 2), IRPD with Locator attachment and no clasp (group 3), IRPD with O-ring attachment and suprabulge clasp (group 4), IRPD with O-ring attachment and infrabulge clasp (group 5), IRPD with O-ring attachment and no clasp (group 6). Data were analyzed using one-way ANOVA, two-way ANOVA, and Tukey tests. The highest mean value was 22.99 lb for prostheses with a Locator attachment and suprabulge clasp. The lowest retentive values were recorded for IARPDs with O-ring attachments. The results of this in vitro study suggest that the precise selection of attachments with or without clasp assemblies may affect the clinical success of mandibular IARPDs. © 2013 by the American College of Prosthodontists.

  4. Analysis of Organizational Architectures for the Air Force Tuition Assistance Program

    National Research Council Canada - National Science Library

    LaPietra, Krista

    2003-01-01

    .... The argument for restructuring to improve quality, customer service, and financial management is pitted against perceived lack of job security and historically poor results from previous restructuring initiatives...

  5. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  6. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  7. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  8. Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)

    National Research Council Canada - National Science Library

    Alageel, Sami

    2003-01-01

    The Royal Saudi Naval Forces (RSNF) are vulnerable to the same kinds of threats to its information infrastructure as the rest of the industrialized nations, As an officer in the RSNF, I am familiar with the special information...

  9. Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense

    Science.gov (United States)

    2016-04-04

    implementation culture , limited personnel, and insufficient resources have compelled DOD to seek its own authorities and greater resources. Multiple...1033 assistance through FY2017. These countries are Armenia, Afghanistan, Azerbaijan, Belize, Benin, Bolivia , Cape Verde, Chad, Colombia, Dominican

  10. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  11. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  12. Multiplying a Force for Good? the Impact of Security Sector Management Postgraduate Education in Ethiopia

    Science.gov (United States)

    Macphee, Paula-Louise; Fitz-Gerald, Ann

    2014-01-01

    This paper argues for the importance, benefits and wider impact of a donor-funded, locally supported postgraduate programme in security sector management (SSM) for government officials in Ethiopia. With the exception of specialised education and training programmes within the field of peace and conflict studies, the role of education in…

  13. The DISAM Journal of International Security Assistance Management. Volume 31, Number 2, August 2009

    Science.gov (United States)

    2009-08-01

    reports alleged that Malaysian immigration offi cials were involved in the traffi cking of Burmese refugees along the Malaysia-Thai border. East Asia and...ethnic Indian- Malaysians with forced labor, and some child labor occurred in plantations. North Korea’s human rights record remained abysmal. While the...the Diet renewed the law allowing Japanese Maritime Self Defense Force ships to refuel coalition ships supporting operations in Afghanistan. And

  14. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  15. Secure and efficient multi-variant execution using hardware-assisted process virtualization

    NARCIS (Netherlands)

    Koning, Koen; Bos, Herbert; Giuffrida, Cristiano

    2016-01-01

    Memory error exploits rank among the most serious security threats. Of the plethora of memory error containment solutions proposed over the years, most have proven to be too weak in practice. Multi-Variant eXecution (MVX) solutions can potentially detect arbitrary memory error exploits via divergent

  16. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  17. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  18. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  19. The DISAM Journal of International Security Assistance Management. Volume 24, Number 3, Spring 2002

    Science.gov (United States)

    2002-01-01

    Performance and Results Act of 1993. A results orientation clearly impacts the need for effective planning and programming of resources, and documenting the...international organizations, active membership of which furthers U.S. economic, political, security, social , and cultural interests. • Continue to meet...Subtotal, East Asia and the Pacific 168.877 169.750 166.250 GLOBAL Human Rights and Demo. Fund [4] 13.421 13.500 13.000 Partnerships to Eliminate Sweatshops

  20. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  1. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  2. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  3. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  4. Carter, Reagan, and Congress: The Changing Dynamics of Security Assistance and Arms Sales

    Science.gov (United States)

    1991-01-01

    only enumerated power given to the President in the Constitution is the title of Commander-in-Chief of the armed forces. As part of the separation of powers , Congress...constitutional separation of powers and the law was struck down on the grounds that this type of resolution fails the test of presentment to the

  5. The DISAM Journal of International Security Assistance Management. Volume 26, Number 1, Fall 2003

    Science.gov (United States)

    2003-01-01

    contribution to international peace and stability. Current Members of the Hall of Fame General Lojas Fodor, Commander, Hungarian Defense Forces and Chief of...Belize Bermuda Bolivia Brazil British Virgin Islands Cayman Islands Chile Colombia Costa Rica Cuba Dominica Dominican Republic Ecuador El

  6. International Food Assistance: A U.S. Governmentwide Strategy Could Accelerate Progress Toward Global Food Security

    Science.gov (United States)

    2009-10-29

    Presidential Initiative to End Hunger in Africa ( IEHA )—which represented the U.S. strategy to help fulfill the MDG goal of halving hunger by 2015...was constrained in funding and limited in scope. In 2005, USAID, the primary agency that implemented IEHA , committed to providing an estimated $200...Development Assistance (DA) and other accounts. IEHA was intended to build an African-led partnership to cut hunger and poverty by investing in efforts

  7. The DISAM Journal of International Security Assistance Management. Volume 23, Number 2, Winter 2001

    Science.gov (United States)

    2001-01-01

    The DISAM Journal, Winter 2001 90 Protection Project to continue its study of international trafficking, prostitution, slavery , debt bondage and other...amounting to debt bondage , involuntary servitude, or slavery . This includes about 50,000 women and children trafficked annually into the U.S. [Section 102...Vietnamese to receive modern demining equipment and other mine- related assistance through the U.S. humanitarian demining program. The Vietnamese will

  8. Identifying and Mitigating Risks in Security Sector Assistance for Africa’s Fragile States

    Science.gov (United States)

    2015-01-01

    publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at...Training M&E monitoring and evaluation MoDA Ministry of Defense Advisors OECD Organisation for Economic Co-operation and Development PDD Presidential... Organisation for Economic Co-operation and Development Development Assistance Committee 2012, “Building Blocks to Prosperity: The Peacebuilding and

  9. The DISAM Journal of International Security Assistance Management. Volume 30, Number 4, December 2008

    Science.gov (United States)

    2008-12-01

    elections. Due to the electoral cycle, Japan may face a few years of legislative uncertainty, which will certainly affect the speed of government...Albania must accelerate judicial reforms and stay on track with its electoral reforms. The fight against corruption must be total in order to show that no...Recreacion Derecho de la Poblacion during the humanitarian/ civic assistance mission Continuing Promise (CP) 2008. Kearsarge is the primary platform

  10. The DISAM Journal of International Security Assistance Management. Volume 23, Number 3, Spring 2001

    Science.gov (United States)

    2001-01-01

    there are rights and freedoms to which every human is entitled, no matter where he or she lives. In this issue we offer the introduction to the report...Assistance Management INTRODUCTION The last DISAM Journal, Winter 2000/2001 Edition, provided an extensive description and analysis of the numerous...FY2001 Country/Program by ESF Budget ESF Geographical Region Funding Request Funding Partnerships to Eliminate Sweatshops 4.000 5.000 3.986 Environmental

  11. sEMG-based joint force control for an upper-limb power-assist exoskeleton robot.

    Science.gov (United States)

    Li, Zhijun; Wang, Baocheng; Sun, Fuchun; Yang, Chenguang; Xie, Qing; Zhang, Weidong

    2014-05-01

    This paper investigates two surface electromyogram (sEMG)-based control strategies developed for a power-assist exoskeleton arm. Different from most of the existing position control approaches, this paper develops force control methods to make the exoskeleton robot behave like humans in order to provide better assistance. The exoskeleton robot is directly attached to a user's body and activated by the sEMG signals of the user's muscles, which reflect the user's motion intention. In the first proposed control method, the forces of agonist and antagonist muscles pair are estimated, and their difference is used to produce the torque of the corresponding joints. In the second method, linear discriminant analysis-based classifiers are introduced as the indicator of the motion type of the joints. Then, the classifier's outputs together with the estimated force of corresponding active muscle determine the torque control signals. Different from the conventional approaches, one classifier is assigned to each joint, which decreases the training time and largely simplifies the recognition process. Finally, the extensive experiments are conducted to illustrate the effectiveness of the proposed approaches.

  12. Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Portugal on 27 June 2006 and the United States on 13 December 2006, and by the Director General of the IAEA on 14 December 2006. Pursuant to the Article XII.1 of the Agreement, the Agreement entered into force on 19 April 2007, the date on which the Agency received written notification from Portugal that its internal requirements for entry into force had been met

  13. Fabrication of Monolithic Bridge Structures by Vacuum-Assisted Capillary-Force Lithography

    KAUST Repository

    Kwak, Rhokyun; Jeong, Hoon Eui; Suh, Kahp Y.

    2009-01-01

    Monolithic bridge structures were fabricated by using capillary-force lithography (CFL), which was developed for patterning polymers over a large area by combining essential features of nanoimprint lithography and capillarity. A patterned soft mold

  14. The Armed Forces Casualty Assistance Readiness Enhancement System (CARES): Design for Flexibility

    Science.gov (United States)

    2006-06-01

    Special Form SQL Structured Query Language SSA Social Security Administration U USMA United States Military Academy V VB Visual Basic VBA Visual Basic for...of Abbreviations ................................................................... 26 Appendix B: Key VBA Macros and MS Excel Coding...internet portal, CARES Version 1.0 is a MS Excel spreadsheet application that contains a considerable number of Visual Basic for Applications ( VBA

  15. The DISAM Journal of International Security Assistance Management. Volume 31, Number 3, November 2009

    Science.gov (United States)

    2009-11-01

    violas. Pacifi c Partnership donated $700 worth of books to the main library in Apia for distribution to school libraries throughout the country...costs are concentrated over a shorter period of time and therefore seem to be greater. Ms. Peters’ talk is the fi rst of a series of book discussions...also buying secondhand aircraft or a service contract. A French Air Force spokesman said there is “a preference for the C-130J because of its size

  16. The DISAM Journal of International Security Assistance Management. Volume 32, Number 1, July 2010

    Science.gov (United States)

    2010-07-01

    Brasilia for the signing ceremony. However, the venue was rescheduled because Jobim is accompanying Brazilian President Luiz Inácio Lula da Silva to...heath care providers, midwives, pharmacists, and nurses . They worked closely with MBLT-3 to make today happen, said a U.S. Army Special Forces Medic...More medical professionals are arriving, and all are highly motivated. We had critical care nurses show up; and after they signed in, they put

  17. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  18. United States assistance to Kazakstan in the area of nuclear material security

    International Nuclear Information System (INIS)

    Tittemore, G.; Mitchell, W.

    1996-01-01

    The US has agreed to pursue cooperative nuclear Material Protection, Control and Accounting (MPC and A) programs with the Republic of Kazakstan. As part of this cooperation, a state system of control accounting and physical protection for nuclear materials is being developed. The US Department of Energy is providing assistance at the four nuclear sites in the Republic to enhance MPC and A systems, techniques, hardware, software, procedures, and training. US survey teams, which include both material control and accounting (MC and A) and physical protection experts, have visited four nuclear sites in Kazakstan. MPC and A assistance is being provided to the Ulba State Holding Company, the Institute of Atomic Energy at Kurchatov City and Ala Tau, and the Mangyshlak Atomic Energy Complex (MAEC) BN-350 nuclear power plant in Aktau. At these sites, the facility staffs and DOE technical teams are working together to identify conditions not completely conforming with accepted international standards, as well as potential enhancements to correct such conditions. Design packages for enhancements at each of these facilities are prepared in collaboration with Kazakstani specialists. After agreement is reached on the specifications by the US and Kazakstan, MPC and A equipment is procured and installed. This paper summarizes the approach to the cooperative programs at these facilities, program status, and future plans

  19. Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR

    KAUST Repository

    Rezki, Zouheir

    2012-04-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secrecy multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secrecy diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secrecy diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secrecy diversity gain of the MIMO wiretap channel. © 2012 IEEE.

  20. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors

    Directory of Open Access Journals (Sweden)

    Jose Maria de Fuentes

    2018-04-01

    Full Text Available Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc. and their current status and usage (e.g., battery consumption, accelerometer readings, etc.. Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism, thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.

  1. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.

    Science.gov (United States)

    de Fuentes, Jose Maria; Gonzalez-Manzano, Lorena; Ribagorda, Arturo

    2018-04-16

    Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.

  2. The experience of clinical supervision for nurses and healthcare assistants in a secure adolescent service: Affecting service improvement.

    Science.gov (United States)

    McCarron, R H; Eade, J; Delmage, E

    2018-04-01

    WHAT IS KNOWN ON THE SUBJECT?: Regular and effective clinical supervision for mental health nurses and healthcare assistants (HCAs) is an important tool in helping to reduce stress and burnout, and in ensuring safe, effective and high-quality mental health care. Previous studies of clinical supervision within secure mental health environments have found both a low availability of clinical supervision, and a low level of staff acceptance of its value, particularly for HCAs. WHAT DOES THIS PAPER ADD TO EXISTING KNOWLEDGE?: In previous studies, the understanding shown by HCAs and nurses around the benefits of clinical supervision may have been limited by the methods used. This study was specifically designed to help them best express their views. In contrast to previous studies, both nurses and HCAs showed a good understanding of the function and value of clinical supervision. Significant improvements in the experience of, and access to, clinical supervision for nurses and HCAs working in secure mental health services may be achieved by raising staff awareness, demonstrating organizational support and increasing monitoring of clinical supervision. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Organizations should consider reviewing their approach to supervision to include raising staff awareness, multidisciplinary supervision, group supervision, and recording and tracking of supervision rates. Organizations should be mindful of the need to provide effective clinical supervision to HCAs as well as nurses. Introduction Studies have found a low availability and appreciation of clinical supervision, especially for healthcare assistants (HCAs). Qualitative research is needed to further understand this. Aims Increase understanding of nurses' and HCAs' experiences of, and access to, clinical supervision. Identify nurses' and HCAs' perceptions of the value and function of clinical supervision. Assess how interventions affect staff's experiences of clinical supervision. Methods In

  3. Fabrication of nano-sized magnetic tunnel junctions using lift-off process assisted by atomic force probe tip.

    Science.gov (United States)

    Jung, Ku Youl; Min, Byoung-Chul; Ahn, Chiyui; Choi, Gyung-Min; Shin, Il-Jae; Park, Seung-Young; Rhie, Kungwon; Shin, Kyung-Ho

    2013-09-01

    We present a fabrication method for nano-scale magnetic tunnel junctions (MTJs), employing e-beam lithography and lift-off process assisted by the probe tip of atomic force microscope (AFM). It is challenging to fabricate nano-sized MTJs on small substrates because it is difficult to use chemical mechanical planarization (CMP) process. The AFM-assisted lift-off process enables us to fabricate nano-sized MTJs on small substrates (12.5 mm x 12.5 mm) without CMP process. The e-beam patterning has been done using bi-layer resist, the poly methyl methacrylate (PMMA)/ hydrogen silsesquioxane (HSQ). The PMMA/HSQ resist patterns are used for both the etch mask for ion milling and the self-aligned mask for top contact formation after passivation. The self-aligned mask buried inside a passivation oxide layer, is readily lifted-off by the force exerted by the probe tip. The nano-MTJs (160 nm x 90 nm) fabricated by this method show clear current-induced magnetization switching with a reasonable TMR and critical switching current density.

  4. Robot-assisted adaptive training: custom force fields for teaching movement patterns.

    Science.gov (United States)

    Patton, James L; Mussa-Ivaldi, Ferdinando A

    2004-04-01

    Based on recent studies of neuro-adaptive control, we tested a new iterative algorithm to generate custom training forces to "trick" subjects into altering their target-directed reaching movements to a prechosen movement as an after-effect of adaptation. The prechosen movement goal, a sinusoidal-shaped path from start to end point, was never explicitly conveyed to the subject. We hypothesized that the adaptation would cause an alteration in the feedforward command that would result in the prechosen movement. Our results showed that when forces were suddenly removed after a training period of 330 movements, trajectories were significantly shifted toward the prechosen movement. However, de-adaptation occurred (i.e., the after-effect "washed out") in the 50-75 movements that followed the removal of the training forces. A second experiment suppressed vision of hand location and found a detectable reduction in the washout of after-effects, suggesting that visual feedback of error critically influences learning. A final experiment demonstrated that after-effects were also present in the neighborhood of training--44% of original directional shift was seen in adjacent, unpracticed movement directions to targets that were 60 degrees different from the targets used for training. These results demonstrate the potential for these methods for teaching motor skills and for neuro-rehabilitation of brain-injured patients. This is a form of "implicit learning," because unlike explicit training methods, subjects learn movements with minimal instructions, no knowledge of, and little attention to the trajectory.

  5. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  6. Effect of Active-Assisted Stretching of 30 Seconds and 60 Seconds in Muscle Force

    Directory of Open Access Journals (Sweden)

    Mirian dos Santos Monteiro

    2018-01-01

    Full Text Available This study aims to analyze the interference of the active-assisted stretching technique in muscle strength. Participating in this study were 39 healthy and physically active individuals subdivided into three groups of active-assisted stretching G30 - 30 seconds, G60 - 60 seconds and CG - control. The muscular strength was evaluated using the isokinetic dynamometer, obtaining the analyzed conditions of torque peak, total work and agonist and antagonist relationship of the dorsiflexor and flexor muscles ankle. The values obtained were statistically analyzed by the SPSS from the “t-test for paired sample” (p ≤ 0.05. When analyzing the effect produced by the stretching, it was observed that the 30-second elongation showed a reduction of the average of the muscular torque in all conditions analyzed, with the exception of the relation between the agonist and the left antagonist and the total work of the right plantar flexors, the G60 - 60 seconds group had a reduction in average muscle torque in all conditions analyzed, except for the relation between agonist and left antagonist that obtained an increase in muscle torque and the CG - control group, there was a reduction in the average of the muscular torque in all the analyzed conditions, except for the torque and total work of the left plantar flexor muscles that presented increase. Thus, it can be concluded that there were differences between the groups of active-assisted stretching of 30 and 60 and that the effect produced by stretching did not present a significant reduction of muscle strength.

  7. Increased multiaxial lumbar motion responses during multiple-impulse mechanical force manually assisted spinal manipulation

    Directory of Open Access Journals (Sweden)

    Gunzburg Robert

    2006-04-01

    Full Text Available Abstract Background Spinal manipulation has been found to create demonstrable segmental and intersegmental spinal motions thought to be biomechanically related to its mechanisms. In the case of impulsive-type instrument device comparisons, significant differences in the force-time characteristics and concomitant motion responses of spinal manipulative instruments have been reported, but studies investigating the response to multiple thrusts (multiple impulse trains have not been conducted. The purpose of this study was to determine multi-axial segmental and intersegmental motion responses of ovine lumbar vertebrae to single impulse and multiple impulse spinal manipulative thrusts (SMTs. Methods Fifteen adolescent Merino sheep were examined. Tri-axial accelerometers were attached to intraosseous pins rigidly fixed to the L1 and L2 lumbar spinous processes under fluoroscopic guidance while the animals were anesthetized. A hand-held electromechanical chiropractic adjusting instrument (Impulse was used to apply single and repeated force impulses (13 total over a 2.5 second time interval at three different force settings (low, medium, and high along the posteroanterior axis of the T12 spinous process. Axial (AX, posteroanterior (PA, and medial-lateral (ML acceleration responses in adjacent segments (L1, L2 were recorded at a rate of 5000 samples per second. Peak-peak segmental accelerations (L1, L2 and intersegmental acceleration transfer (L1–L2 for each axis and each force setting were computed from the acceleration-time recordings. The initial acceleration response for a single thrust and the maximum acceleration response observed during the 12 multiple impulse trains were compared using a paired observations t-test (POTT, alpha = .05. Results Segmental and intersegmental acceleration responses mirrored the peak force magnitude produced by the Impulse Adjusting Instrument. Accelerations were greatest for AX and PA measurement axes. Compared to

  8. How the ecosystem of digital assistants can ensure the security of personal data

    Directory of Open Access Journals (Sweden)

    Alexandr V. Mamaev

    2018-05-01

    Full Text Available Number of cybercrimes is constantly rising both in Europe, and around the world. The costs incurred from such malicious activities are rising correspondingly. According to the data collected by Jupiter Research these costs increased from $1.5 trillion in 2015 to $2 trillion in 2019. That is why European Union is expected to introduce major changes to the Personal Data Protection Acts which stayed mostly unchanged since the 1990s. The consequences of those changes will be felt in countries beyond the European Union. The personal data of internet users have long become a commodity on the e-commerce market. Yet the manipulations with the personal data cause concerns among both the users, who do not fully realize how and to what purposes their data are used, and governments, who try to protect the confidentiality remains by the law. Despite that the number of incidents with data leaks continues to rise exponentially. In December 2017 the lawyers from Hill Dickinson, a UK commercial law firm, filed a lawsuit against Google regarding unlawful collection of the iPhone users’ data. Another company that is about to have problems with law is Uber Technologiesm, which sent SMS messages to its clients without obtaining formal permissions for that. Finally, in March 2018 it was Facebook which had to explain the way the personal data on more than 80 million users have leaked and ended up in the hands of a third party.  The authors of this article assessed the possibilities for introducing the ecosystem of virtual assistants and blockchain technology for safe and depersonalized data processing as well as its further use. This system opens broad unexpected opportunities for the machine-to-machine-marketing.

  9. Fabrication of Monolithic Bridge Structures by Vacuum-Assisted Capillary-Force Lithography

    KAUST Repository

    Kwak, Rhokyun

    2009-04-06

    Monolithic bridge structures were fabricated by using capillary-force lithography (CFL), which was developed for patterning polymers over a large area by combining essential features of nanoimprint lithography and capillarity. A patterned soft mold was placed on a spin-coated UV-curable resin on a substrate. The polymer then moved into the cavity of the mold by capillary action and then solidified after exposure to UV radiation. The uncured resin was forced to migrate into the cavity of a micropatterned PDMS mold by capillarity, and then exposed to UV radiation under a high-energy mercury lamp with intensity. A rotary pump was then turned on, decreasing the air pressure in the chamber. SEM images were taken with a high-resolution SEM at an acceleration voltage greater than 15 kV. It was observed that when the air pressure was rapidly reduced to a low vacuum, the top layer moved into the nanochannels with a meniscus at the interface between the nanoscale PUA and the base structure.

  10. Needs assessment and implementation of an employee assistance program: promoting a healthier work force.

    Science.gov (United States)

    Monfils, M K

    1995-05-01

    1. The functions of a continuous quality improvement tool used by Deming--the Plan, Do, Check, Act Cycle--can be applied to the assessment, implementation, and ongoing evaluation of an Employee Assistance Program (EAP). 2. Various methods are available to assess the need for an EAP. As much data as possible should be collected to qualify and quantify the need so that management can make an informed decision and develop measures to determine program effectiveness. 3. Once an EAP is implemented, it should be monitored continually against the effectiveness measures initially developed. Using a continuous quality improvement process, the occupational health nurse and the EAP provider can establish a dynamic relationship that allows for growth beyond the original design and increased effectiveness of service to employees.

  11. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  12. ESHRE Task Force on Ethics and Law 23: medically assisted reproduction in singles, lesbian and gay couples, and transsexual people†.

    Science.gov (United States)

    De Wert, G; Dondorp, W; Shenfield, F; Barri, P; Devroey, P; Diedrich, K; Tarlatzis, B; Provoost, V; Pennings, G

    2014-09-01

    This Task Force document discusses ethical issues arising with requests for medically assisted reproduction from people in what may be called 'non-standard' situations and relationships. The document stresses that categorically denying access to any of these groups cannot be reconciled with a human rights perspective. If there are concerns about the implications of assisted reproduction on the wellbeing of any of the persons involved, including the future child, a surrogate mother or the applicants themselves, these concerns have to be considered in the light of the available scientific evidence. When doing so it is important to avoid the use of double standards. More research is needed into the psychosocial implications of raising children in non-standard situations, especially with regard to single women, male homosexual couples and transsexual people. © The Author 2014. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [fr

  14. Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Project and Supply Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Project and Supply Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Poland on 8 January 2007, the United States on 12 January 2007 and by the Director General of the IAEA on 16 January 2007. Pursuant to the Article XII of the Agreement, the Agreement entered into force on 16 January 2007, upon signature by the representatives of Poland, the United States and the Director General of the IAEA

  15. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States

  16. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [es

  17. Study on Effect of Ultrasonic Vibration on Grinding Force and Surface Quality in Ultrasonic Assisted Micro End Grinding of Silica Glass

    Directory of Open Access Journals (Sweden)

    Zhang Jianhua

    2014-01-01

    Full Text Available Ultrasonic vibration assisted micro end grinding (UAMEG is a promising processing method for micro parts made of hard and brittle materials. First, the influence of ultrasonic assistance on the mechanism of this processing technology is theoretically analyzed. Then, in order to reveal the effects of ultrasonic vibration and grinding parameters on grinding forces and surface quality, contrast grinding tests of silica glass with and without ultrasonic assistance using micro radial electroplated diamond wheel are conducted. The grinding forces are measured using a three-component dynamometer. The surface characteristics are detected using the scanning electron microscope. The experiment results demonstrate that grinding forces are significantly reduced by introducing ultrasonic vibration into conventional micro end grinding (CMEG of silica glass; ultrasonic assistance causes inhibiting effect on variation percentages of tangential grinding force with grinding parameters; ductile machining is easier to be achieved and surface quality is obviously improved due to ultrasonic assistance in UAMEG. Therefore, larger grinding depth and feed rate adopted in UAMEG can lead to the improvement of removal rate and machining efficiency compared with CMEG.

  18. Allegiance: Egypt Security Forces

    Science.gov (United States)

    2013-12-01

    Sadat began a policy of economically opening Egypt to the West which led to mandatory subsidy reductions on cooking fuel, rice , bread and other...by a distance from one another. The Emergency Law was not violated, but protestors could look around and see others wearing a black or white shirt...expected after the uprising of 2011 never truly materialized; the Interior Ministry instituted various cosmetic changes, but its basic construct and

  19. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    Science.gov (United States)

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  20. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  1. Food assistance is associated with improved body mass index, food security and attendance at clinic in an HIV program in central Haiti: a prospective observational cohort study

    Directory of Open Access Journals (Sweden)

    Ivers Louise C

    2010-08-01

    Full Text Available Abstract Background Few data are available to guide programmatic solutions to the overlapping problems of undernutrition and HIV infection. We evaluated the impact of food assistance on patient outcomes in a comprehensive HIV program in central Haiti in a prospective observational cohort study. Methods Adults with HIV infection were eligible for monthly food rations if they had any one of: tuberculosis, body mass index (BMI 2, CD4 cell count 3 (in the prior 3 months or severe socio-economic conditions. A total of 600 individuals (300 eligible and 300 ineligible for food assistance were interviewed before rations were distributed, at 6 months and at 12 months. Data collected included demographics, BMI and food insecurity score (range 0 - 20. Results At 6- and 12-month time-points, 488 and 340 subjects were eligible for analysis. Multivariable analysis demonstrated that at 6 months, food security significantly improved in those who received food assistance versus who did not (-3.55 vs -0.16; P Conclusions Food assistance was associated with improved food security, increased BMI, and improved adherence to clinic visits at 6 and 12 months among people living with HIV in Haiti and should be part of routine care where HIV and food insecurity overlap.

  2. Exploration of Two Training Paradigms Using Forced Induced Weight Shifting With the Tethered Pelvic Assist Device to Reduce Asymmetry in Individuals After Stroke: Case Reports.

    Science.gov (United States)

    Bishop, Lauri; Khan, Moiz; Martelli, Dario; Quinn, Lori; Stein, Joel; Agrawal, Sunil

    2017-10-01

    Many robotic devices in rehabilitation incorporate an assist-as-needed haptic guidance paradigm to promote training. This error reduction model, while beneficial for skill acquisition, could be detrimental for long-term retention. Error augmentation (EA) models have been explored as alternatives. A robotic Tethered Pelvic Assist Device has been developed to study force application to the pelvis on gait and was used here to induce weight shift onto the paretic (error reduction) or nonparetic (error augmentation) limb during treadmill training. The purpose of these case reports is to examine effects of training with these two paradigms to reduce load force asymmetry during gait in two individuals after stroke (>6 mos). Participants presented with baseline gait asymmetry, although independent community ambulators. Participants underwent 1-hr trainings for 3 days using either the error reduction or error augmentation model. Outcomes included the Borg rating of perceived exertion scale for treatment tolerance and measures of force and stance symmetry. Both participants tolerated training. Force symmetry (measured on treadmill) improved from pretraining to posttraining (36.58% and 14.64% gains), however, with limited transfer to overground gait measures (stance symmetry gains of 9.74% and 16.21%). Training with the Tethered Pelvic Assist Device device proved feasible to improve force symmetry on the treadmill irrespective of training model. Future work should consider methods to increase transfer to overground gait.

  3. The DISAM Journal of International Security Assistance Management. Volume 29, Number 4, December 2007. Building Partnership Capacity

    Science.gov (United States)

    2007-12-01

    Demographic Diversity and Change in the Central American Isthmus. Ann R. Pebley, Luis Rosero Bixby, and Universidad de Costa Rica. Programa Centroamericano...mirrored in the demographic composition of El Salvador. According to Programa Salvaderaño de Investigación Sobre Desarrollo y Medio Ambiente (PRISMA...regarding the existence of a signifi cant linkage between environmental security and national security. The inclusion of environmental security

  4. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  5. Securing Healthcare’s Quantified-Self Data: A Comparative Analysis Versus Personal Financial Account Aggregators Based on Porter’s Five Forces Framework for Competitive Force

    Science.gov (United States)

    2016-09-01

    PORTER’S FIVE FORCES FRAMEWORK FOR COMPETITIVE FORCES Catherine H. Chiang Management Program Analyst, United States Citizenship and Immigration...2009): 454–66, doi:10.1377/hlthaff.28.2.454. 34 Catherine L. Anderson and Ritu Agarwal, “The Digitization of Healthcare: Boundary Risks, Emotion...allows patterns of distinctive characteristics to be tracked. As more behaviors are digitized , these unique characteristics could easily be used to

  6. Guidelines for the training, credentialing, use, and supervision of speech-language pathology assistants. Task Force on Support Personnel.

    Science.gov (United States)

    1996-01-01

    These guidelines are an official statement of the American Speech-Language-Hearing Association. They provide guidance on the training, credentialing, use, and supervision of one category of support personnel in speech-language pathology: speech-language pathology assistants. Guidelines are not official standards of the Association. They were developed by the Task Force on Support Personnel: Dennis J. Arnst, Kenneth D. Barker, Ann Olsen Bird, Sheila Bridges, Linda S. DeYoung, Katherine Formichella, Nena M. Germany, Gilbert C. Hanke, Ann M. Horton, DeAnne M. Owre, Sidney L. Ramsey, Cathy A. Runnels, Brenda Terrell, Gerry W. Werven, Denise West, Patricia A. Mercaitis (consultant), Lisa C. O'Connor (consultant), Frederick T. Spahr (coordinator), Diane Paul-Brown (associate coordinator), Ann L. Carey (Executive Board liaison). The 1994 guidelines supersede the 1981 guidelines entitled, "Guidelines for the Employment and Utilization of Supportive Personnel" (Asha, March 1981, 165-169). Refer to the 1995 position statement on the "Training, Credentialing, Use, and Supervision of Support Personnel in Speech-Language Pathology" (Asha, 37 [Suppl. 14], 21).

  7. Enabling Others to Win in a Complex World: Maximizing Security Force Assistance Potential in the Regionally Aligned Brigade Combat Team

    Science.gov (United States)

    2015-12-01

    Knife Fights: A Memoir of Modern War in Theory and Practice. New York: The Penguin Press, 2014. Odierno, Raymond T. and John M. McHugh , Army...Raymond T. Odierno and John M. McHugh , Army Strate- gic Planning Guidance: 2014, Washington, DC: Department of the Army, 2014, p. 2. 12. Ibid., p. 5

  8. THE GODFATHER DOCTRINE SECURITY FORCE ASSISTANCE (SFA) TRAINING - AN OFFER THE MARINE CORPS CAN’T REFUSE

    Science.gov (United States)

    2016-02-16

    experience training military advisors suggests that the commander’s exposure to military advising has a direct affect on who is nominated to advise... Advisor : CAPT Patrick J McCormick, USN 16 February 2016 DISTRIBUTION A. Approved for public release: distribution unlimited. 2 DISCLAIMER The...SFA AT) leader / senior advisor . He advised an Iraqi National Police (INP) Port of Entry Director near the Iraq / Syria Border and Afghan

  9. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ..., seeks industry views and perspectives to inform an on-going strategic National Security Space Launch... the U.S. Government. 2. What are the critical issues that concern current and prospective launch...

  10. Corruption in the Kenya Police Force and Impacts on Kenyan Security: Investigating the Need for Police Reforms

    Science.gov (United States)

    2017-03-21

    been using the police culture, philosophy , and organization structure in the Police Service based on the British colonial security system. Such...reflects on the police corruption that wreaks the moral authority of law enforcement; thus, undermining the public trust and confidence in the law...economic growth emphasized in the Kenya’s vision 2030. Since independence, Kenya’s security structure, philosophy , and systems have been inherited and

  11. EKSISTENSI BANTUAN HUKUM TERHADAP PRAJURIT TNI SEBAGAI PELAKU TINDAK PIDANA DAN PRAKTIKNYA / The Existence And Practice Of Legal Assistance To Indonesian National Armed Forces Personnel As Criminal Offender

    Directory of Open Access Journals (Sweden)

    Tumbur Palti D Hutapea

    2016-11-01

    Full Text Available Bantuan Hukum merupakan bantuan yang diberikan oleh seorang ahli di bidang hukum atau penasihat hukum kepada seorang yang terkena masalah hukum di setiap tahapan pemeriksaan baik di luar maupun di dalam pengadilan. Peranan bantuan hukum bagi Prajurit TNI sangat diperlukan dalam menghadapi permasalahan hukum yang dihadapinya. Peraturan perundang-undangan yang mengatur bantuan hukum di lingkungan TNI sepanjang sejarah berdirinya TNI telah mengutamakan bantuan hukum yang berasal dari internal TNI berdasarkan perintah di mana personilnya belum memiliki akreditasi/sertifikasi, sehingga kalangan eksternal sulit memasuki lingkungan hukum militer sebab harus memperoleh izin Perwira Penyerah Perkara (Papera. Perlunya prioritas percepatan RUU tentang Peradilan Militer yang salah satunya merevisi aturan pemberian bantuan hukum kepada Prajurit TNI. Selanjutnya diperlukan kebebasan memilih dan menetapkan layanan bantuan hukum dari advokat profesional atau dengan menggunakan sarana posbakum, khususnya perkara yang diancam pidana mati dan pidana tambahan berupa pemecatan dari dinas militer.   Legal assistance is an assistance given by an expertise in law area or legal advisors to those who have legal problems at every stage of investigation both outside and inside the court. The role of legal assistance for Indonesian National Armed Forces personnel is important. The Legislation covering legal assistance in the Indonesian National Armed Forces community throughout the history has prioritized internal legal assistance where the personnel itself does not have certification/ accreditation for it. The external is hard to get involve and have to obtain special permission from the Officers hand the case (Papera. Accelerating the Bill on Military Justice to revise the rules on providing legal assistance to Army personnel is priority. Furthermore, the necessary freedom to choose and establish legal assistance services of a professional advocate or by means POSBAKUM

  12. Evaluating the effect of three-dimensional visualization on force application and performance time during robotics-assisted mitral valve repair.

    Science.gov (United States)

    Currie, Maria E; Trejos, Ana Luisa; Rayman, Reiza; Chu, Michael W A; Patel, Rajni; Peters, Terry; Kiaii, Bob B

    2013-01-01

    The purpose of this study was to determine the effect of three-dimensional (3D) binocular, stereoscopic, and two-dimensional (2D) monocular visualization on robotics-assisted mitral valve annuloplasty versus conventional techniques in an ex vivo animal model. In addition, we sought to determine whether these effects were consistent between novices and experts in robotics-assisted cardiac surgery. A cardiac surgery test-bed was constructed to measure forces applied during mitral valve annuloplasty. Sutures were passed through the porcine mitral valve annulus by the participants with different levels of experience in robotics-assisted surgery and tied in place using both robotics-assisted and conventional surgery techniques. The mean time for both the experts and the novices using 3D visualization was significantly less than that required using 2D vision (P robotic system with either 2D or 3D vision (P robotics-assisted mitral valve annuloplasty than during conventional open mitral valve annuloplasty. This finding suggests that 3D visualization does not fully compensate for the absence of haptic feedback in robotics-assisted cardiac surgery.

  13. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  14. Portuguese Armed Forces in the International Security and Assistance Force in Afghanistan: Psychological Support for the Command of Kabul International Airport

    Science.gov (United States)

    2006-04-01

    Paz: - O modelo de avaliação psicológica: Considerações epistemológicas e metodológicas. Revista de Psicologia Militar. Nº 11, pp. 173-184. Silva, D...População Militar Portuguesa. Revista de Psicologia Militar, Nº 12 – 1999/2000. Surrador, A. (2003). Contribuição da Psicologia Militar para as

  15. The impact of a food assistance program on nutritional status, disease progression, and food security among people living with HIV in Uganda.

    Science.gov (United States)

    Rawat, Rahul; Faust, Elizabeth; Maluccio, John A; Kadiyala, Suneetha

    2014-05-01

    Although the last decade has seen increased access to antiretroviral therapy across the developing world, widespread food insecurity and undernutrition continue to compromise an effective response to the AIDS epidemic. Limited evidence exists on the potential benefit of food security and nutrition interventions to people living with HIV (PLHIV). We capitalized on an existing intervention to PLHIV in Uganda and conducted a prospective quasi-experimental study evaluating the impact of a monthly household food basket, provided to food insecure antiretroviral therapy-naive PLHIVs for 12 months. The outcomes of interest measured at baseline and follow-up were nutritional status [body mass index; mid-upper arm circumference and hemoglobin (Hb) concentrations], disease severity (CD4 count), and 2 measures of food security: diet quality (Individual Dietary Diversity Score) and food access (Household Food Insecurity Access Scale). We used difference-in-difference propensity score matching to examine the impact of food assistance. Over 12 months, food assistance significantly increased body mass index by 0.6 kg/m (P Insecurity Access Scale, by 2.1 points (P insecurity.

  16. Lift force fluctuations of magnetically levitated vehicles with an integrated synchronous linear motor and their significance for the technical security

    Energy Technology Data Exchange (ETDEWEB)

    Mnich, P; Huebner, K D

    1980-07-15

    In this paper the influence of the motor current on the magnetic force is investigated by an analytical method. With the integrated synchronous linear motor the reactions of the current sheet on the excitation field are depending on the pole angle and the amplitude of the current sheet. For an undisturbed operation - current sheet and induction wave in phase - the influence of the motor current on the magnetic force can be neglected. In case of a disturbed performance, i.e. when the pole angle is changing periodically, fluctuations of the magnetic force will be found. This effect has to be compensated by a reserve magnetic force in the levitation control. With the technical data for the new magnetic levitation pilots plants (International Traffic Fair 1979 at Hamburg and Transrapid - Pilot Plant Emsland) the stated relations are evaluated. Approximated relations for the levitation force are derived. For comparison, a finite-difference computer programme from the 'Institut fuer elektrische Maschinen, Antriebe und Bahnen, Technische Universitaet Braunschweig' is applied. The approximated relations developed in this paper are verified - with a sufficient precision - by the numerical calculations.

  17. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  18. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  19. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  20. FEMA Hazard Mitigation Assistance Flood Mitigation Assistance (FMA) Data

    Data.gov (United States)

    Department of Homeland Security — This dataset contains closed and obligated projects funded under the following Hazard Mitigation Assistance (HMA) grant programs: Flood Mitigation Assistance (FMA)....

  1. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    Science.gov (United States)

    2015-05-21

    intersection of complexity, social interaction, political violence, and military force. Lastly, I owe a tremendous debt to my wife and family for giving me the...space to pursue these intellectual endeavors while “taking a break” from deployment. In partial payment of that debt , I promise not to mention any...Going Big by Getting Small (Denver, CO: Outskirts Press), 162-163. 12 liberalism.19 From the Greek civil war of the late 1940s to the modern

  2. Are Nutrition and Food Security Concerns a Priority of Certified Nursing Assistants in Work and Family Environments?

    OpenAIRE

    Holsinger, Amanda Joy Toscano

    2002-01-01

    Certified Nursing Assistants (CNAs) are responsible for the care of Americaâ s aging population. CNAs are paid a miniscule amount of money and are often ineligible for medical benefits through their employers. CNAs bathe, change, feed, and help toilet the residents of long-term care facilities. The stressful work and personal lives of CNAs leads to many problems such as high turnover rates, absenteeism, health problems, and elder abuse. In the United States, food insecurity is a concern ...

  3. The study on force, surface integrity, tool life and chip on laser assisted machining of inconel 718 using Nd:YAG laser source.

    Science.gov (United States)

    Venkatesan, K

    2017-07-01

    Inconel 718, a high-temperature alloy, is a promising material for high-performance aerospace gas turbine engines components. However, the machining of the alloy is difficult owing to immense shear strength, rapid work hardening rate during turning, and less thermal conductivity. Hence, like ceramics and composites, the machining of this alloy is considered as difficult-to-turn materials. Laser assisted turning method has become a promising solution in recent years to lessen cutting stress when materials that are considered difficult-to-turn, such as Inconel 718 is employed. This study investigated the influence of input variables of laser assisted machining on the machinability aspect of the Inconel 718. The comparison of machining characteristics has been carried out to analyze the process benefits with the variation of laser machining variables. The laser assisted machining variables are cutting speeds of 60-150 m/min, feed rates of 0.05-0.125 mm/rev with a laser power between 1200 W and 1300 W. The various output characteristics such as force, roughness, tool life and geometrical characteristic of chip are investigated and compared with conventional machining without application of laser power. From experimental results, at a laser power of 1200 W, laser assisted turning outperforms conventional machining by 2.10 times lessening in cutting force, 46% reduction in surface roughness as well as 66% improvement in tool life when compared that of conventional machining. Compared to conventional machining, with the application of laser, the cutting speed of carbide tool has increased to a cutting condition of 150 m/min, 0.125 mm/rev. Microstructural analysis shows that no damage of the subsurface of the workpiece.

  4. The study on force, surface integrity, tool life and chip on laser assisted machining of inconel 718 using Nd:YAG laser source

    Directory of Open Access Journals (Sweden)

    K. Venkatesan

    2017-07-01

    Full Text Available Inconel 718, a high-temperature alloy, is a promising material for high-performance aerospace gas turbine engines components. However, the machining of the alloy is difficult owing to immense shear strength, rapid work hardening rate during turning, and less thermal conductivity. Hence, like ceramics and composites, the machining of this alloy is considered as difficult-to-turn materials. Laser assisted turning method has become a promising solution in recent years to lessen cutting stress when materials that are considered difficult-to-turn, such as Inconel 718 is employed. This study investigated the influence of input variables of laser assisted machining on the machinability aspect of the Inconel 718. The comparison of machining characteristics has been carried out to analyze the process benefits with the variation of laser machining variables. The laser assisted machining variables are cutting speeds of 60–150 m/min, feed rates of 0.05–0.125 mm/rev with a laser power between 1200 W and 1300 W. The various output characteristics such as force, roughness, tool life and geometrical characteristic of chip are investigated and compared with conventional machining without application of laser power. From experimental results, at a laser power of 1200 W, laser assisted turning outperforms conventional machining by 2.10 times lessening in cutting force, 46% reduction in surface roughness as well as 66% improvement in tool life when compared that of conventional machining. Compared to conventional machining, with the application of laser, the cutting speed of carbide tool has increased to a cutting condition of 150 m/min, 0.125 mm/rev. Microstructural analysis shows that no damage of the subsurface of the workpiece.

  5. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  6. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  7. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  8. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Prediction of protein structure with the coarse-grained UNRES force field assisted by small X-ray scattering data and knowledge-based information.

    Science.gov (United States)

    Karczyńska, Agnieszka S; Mozolewska, Magdalena A; Krupa, Paweł; Giełdoń, Artur; Liwo, Adam; Czaplewski, Cezary

    2018-03-01

    A new approach to assisted protein-structure prediction has been proposed, which is based on running multiplexed replica exchange molecular dynamics simulations with the coarse-grained UNRES force field with restraints derived from knowledge-based models and distance distribution from small angle X-ray scattering (SAXS) measurements. The latter restraints are incorporated into the target function as a maximum-likelihood term that guides the shape of the simulated structures towards that defined by SAXS. The approach was first verified with the 1KOY protein, for which the distance distribution was calculated from the experimental structure, and subsequently used to predict the structures of 11 data-assisted targets in the CASP12 experiment. Major improvement of the GDT_TS was obtained for 2 targets, minor improvement for other 2 while, for 6 target GDT_TS deteriorated compared with that calculated for predictions without the SAXS data, partly because of assuming a wrong multimeric state (for Ts866) or because the crystal conformation was more compact than the solution conformation (for Ts942). Particularly good results were obtained for Ts909, in which use of SAXS data resulted in the selection of a correctly packed trimer and, subsequently, increased the GDT_TS of monomer prediction. It was found that running simulations with correct oligomeric state is essential for the success in SAXS-data-assisted prediction. © 2017 Wiley Periodicals, Inc.

  12. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  13. Skin graft secured by VAC (vacuum-assisted closure) therapy in chronic leg ulcers: A controlled randomized study.

    Science.gov (United States)

    Leclercq, A; Labeille, B; Perrot, J-L; Vercherin, P; Cambazard, F

    2016-01-01

    Leg ulcers are a common condition. There have been very few studies of combined therapy involving VAC (vacuum-assisted closure) and skin graft. We performed a randomized controlled trial of VAC therapy vs. hydrocolloid dressings over 5 days following autologous grafting on chronic leg ulcers. The primary objective was to assess the difference in success (defined as a reduction in wound area of at least 50% at 1 month) between the two dressing methods. Forty-six patients with ulcers present for over one month were included. Following a 7-day hospitalization period, follow-up was performed for 3 months on an outpatient basis. Our study does not demonstrate a statistically significant difference, with a 45.8% success rate in the VAC group vs. 40.9% in the conventional dressing group (P=0.73). In the venous ulcer group, the success rate was 57.9% for VAC vs. 40% for conventional dressings (P=0.3). The difference in favor of VAC in this group was not statistically significant, most likely due to an insufficient number of patients studied. Our study does not demonstrate superiority of VAC associated with skin graft over conventional dressings. We observed more complications with VAC (40%) than with conventional dressings (23%) (P=0.06). Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  14. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  16. Experience and Security of the Hand-Assisted Laparoscopic Nephrectomy of a Living Donor in a Public Health Center.

    Science.gov (United States)

    Garcia-Covarrubias, L; Prieto-Olivares, P; Bahena-Portillo, A; Cicero-Lebrija, A; Hinojosa-Heredia, H; Fernández-Lopez, L J; Almeida-Nieto, C; Visag-Castillo, V J; Carrión-Barrera, J; Castro-Ñuco, I; Pedraza-Rojas, E; Rosas-Herrera, A; García-Covarrubias, A; Fernández-Angel, D; Diliz-Perez, H S

    2018-03-01

    Hand-assisted laparoscopic nephrectomy (HALDN) is currently the procedure of choice for obtaining living donor kidneys for transplantation. In our institution, it has been the standard procedure for 5 years. Previous studies have shown the same function of the graft as that obtained by open surgery, with a lower rate of bleeding and no differences in complications. We sought to demonstrate the experience and safety of HALDN compared with open donor nephrectomy in healthy donors for kidney transplantation. A retrospective analytical observational study was conducted, reviewing the records of the living donors for kidney transplant undergoing open donor nephrectomy or HALDN in our center from March 1, 2009, to March 1, 2016. Renal function was assessed by the estimated glomerular filtration rate by the Modification of Diet in Renal Disease method before and after donation, as well as bleeding (mL), and complications (according to Clavien), performing a comparative analysis between the two techniques using parametric or nonparametric tests. A total of 179 living donor nephrectomies were performed during the study period-31 open donor nephrectomy (17.3%) and 148 HALDN (82.7%)-without relevant baseline differences, except for creatinine. HALDN has a shorter surgical time (156,473 ± 87.75 minutes vs 165,484 ± 69.95 minutes) and less bleeding (244.59 ± 416.08 mL vs 324.19 ± 197.986 mL) and a shorter duration of hospital stay (3.74 ± 1.336 days vs 4.75 ± 1.226 days). There were no significant differences in surgical complications at 30 days, or graft loss reported; there were 3 conversions (1.7%) from the HALDN to the open technique. There were no differences in renal function in the donors or recipients at the 5th day or the month after surgery. Laparoscopic nephrectomy has replaced open surgery as the gold standard for living kidney donors. HALDN is a safe and feasible procedure when compared with open donor nephrectomy, achieving a shorter surgical time with

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. The productivity of physician assistants and nurse practitioners and health work force policy in the era of managed health care.

    Science.gov (United States)

    Scheffler, R M; Waitzman, N J; Hillman, J M

    1996-01-01

    Managed care is spreading rapidly in the United States and creating incentives for physician practices to find the most efficient combination of health professionals to deliver care to an enrolled population. Given these trends, it is appropriate to reexamine the roles of physician assistants (PAs) and nurse practitioners (NPs) in the health care workforce. This paper briefly reviews the literature on PA and NP productivity, managed care plans' use of PAs and NPs, and the potential impact of PAs and NPs on the size and composition of the future physician workforce. In general, the literature supports the idea that PAs and NPs could have a major impact on the future health care workforce. Studies show significant opportunities for increased physician substitution and even conservative assumptions about physician task delegation imply a large increase in the number of PAs and NPs that can be effectively deployed. However, the current literature has certain limitations that make it difficult to quantify the future impact of PAs and NPs. Among these limitations is the fact that virtually all formal productivity studies were conducted in fee-for-service settings during the 1970s, rather than managed care settings. In addition, the vast majority of PA and NP productivity studies have viewed PAs and NPs as physician substitutes rather than as members of interdisciplinary health care teams, which may become the dominant health care delivery model over the next 10-20 years.

  19. Calibration of atomic force microscope cantilevers using standard and inverted static methods assisted by FIB-milled spatial markers

    International Nuclear Information System (INIS)

    Slattery, Ashley D; Blanch, Adam J; Quinton, Jamie S; Gibson, Christopher T

    2013-01-01

    Static methods to determine the spring constant of AFM cantilevers have been widely used in the scientific community since the importance of such calibration techniques was established nearly 20 years ago. The most commonly used static techniques involve loading a trial cantilever with a known force by pressing it against a pre-calibrated standard or reference cantilever. These reference cantilever methods have a number of sources of uncertainty, which include the uncertainty in the measured spring constant of the standard cantilever, the exact position of the loading point on the reference cantilever and how closely the spring constant of the trial and reference cantilever match. We present a technique that enables users to minimize these uncertainties by creating spatial markers on reference cantilevers using a focused ion beam (FIB). We demonstrate that by combining FIB spatial markers with an inverted reference cantilever method, AFM cantilevers can be accurately calibrated without the tip of the test cantilever contacting a surface. This work also demonstrates that for V-shaped cantilevers it is possible to determine the precise loading position by AFM imaging the section of the cantilever where the two arms join. Removing tip-to-surface contact in both the reference cantilever method and sensitivity calibration is a significant improvement, since this is an important consideration for AFM users that require the imaging tip to remain in pristine condition before commencing measurements. Uncertainties of between 5 and 10% are routinely achievable with these methods. (paper)

  20. Simulation Assisted Analysis of the Intrinsic Stiffness for Short DNA Molecules Imaged with Scanning Atomic Force Microscopy.

    Directory of Open Access Journals (Sweden)

    Haowei Wang

    Full Text Available Studying the mechanical properties of short segments of dsDNA can provide insight into various biophysical phenomena, from DNA looping to the organization of nucleosomes. Scanning atomic force microscopy (AFM is able to acquire images of single DNA molecules with near-basepair resolution. From many images, one may use equilibrium statistical mechanics to quantify the intrinsic stiffness (or persistence length of the DNA. However, this approach is highly dependent upon both the correct microscopic polymer model and a correct image analysis of DNA contours. These complications have led to significant debate over the flexibility of dsDNA at short length scales. We first show how to extract accurate measures of DNA contour lengths by calibrating to DNA traces of simulated AFM data. After this calibration, we show that DNA adsorbed on an aminopropyl-mica surface behaves as a worm-like chain (WLC for contour lengths as small as ~20 nm. We also show that a DNA binding protein can modify the mechanics of the DNA from that of a WLC.

  1. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  3. Forced Dependency and Legal Barriers: Implications of the UK’s Immigration and Social Security Policies for Minoritized Women Living in Abusive Intimate Relationships in Northern Ireland

    Directory of Open Access Journals (Sweden)

    Monica McWilliams

    2015-12-01

    Full Text Available This paper examines the complexities of the help-seeking process of minoritized women (primarily asylum-seekers and immigrants experiencing domestic violence in Northern Ireland. The term ‘minoritized’ is used here to emphasize that “minority” status is not a static or innate trait of certain groups but instead is the outcome of a process of being positioned as a minority. The paper addresses the intersections of ethnicity, nationality, class and gender and shows how state policies in relation to immigration and social security reinforce inequalities in gendered power relations. Despite attempts to improve the social security and immigration systems, the findings from a Northern Ireland study show how recent policy changes have not addressed the systemic institutional racism and institutionalised patriarchy in these agencies. Where avenues for action are undermined by such practices, the policies raise concerns about the safety and protection of minoritized women living in abusive relationships. We argue that the UK is failing to meet its human rights responsibilities to provide adequate support and assistance to minoritized women in abusive relationships and conclude that delivering state accountability alongside a human rights framework based on security, autonomy, liberty and equality is what is needed. Este artículo analiza las complejidades del proceso de búsqueda de ayuda en Irlanda del Norte para mujeres pertenecientes a minorías (principalmente solicitantes de asilo e inmigrantes que sufren violencia doméstica. El término 'minoritarizadas' se utiliza aquí para hacer hincapié en que la situación de "minoría" no es un rasgo estático o innato de ciertos grupos, sino que es el resultado de un proceso de ser posicionado como una minoría. El artículo aborda las intersecciones de origen étnico, nacionalidad, clase y género y muestra cómo las políticas estatales en relación a la inmigración y la seguridad social

  4. Daily Public Assistance Grants Award Activity

    Data.gov (United States)

    Department of Homeland Security — Daily activity of Public Assistance Grant Awards, including FEMA Region, State, Disaster Declaration Number, Event description, Mission Assigned agency, Assistance...

  5. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    Science.gov (United States)

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC

  6. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  7. CD-ROM nutrient analysis database assists self-monitoring behavior of active duty Air Force personnel receiving nutrition counseling for weight loss.

    Science.gov (United States)

    Heetderks-Cox, M J; Alford, B B; Bednar, C M; Heiss, C J; Tauai, L A; Edgren, K K

    2001-09-01

    This study observed the effect of using a computerized vs manual method of self-monitoring among Air Force personnel receiving nutrition counseling for weight loss. Subjects who enrolled during the first 2 weeks of the 4-week recruitment period completed food records for 6 weeks using a CD-ROM nutrient database (intervention group) whereas those who enrolled during the last 2 weeks used a food record booklet (comparison group). Of the 42 subjects (n = 23 intervention group and n = 19 comparison group), only 113 intervention and 11 comparison group subjects (57% of study enrollees) submitted at least 1 food record during the study and were included in the analysis, which included review of pre- and poststudy questionnaires, food records, and focus group data. There were no significant differences between the number of days per week documented or average number of items recorded daily. All 9 intervention as compared to 2 comparison group subjects who completed a poststudy questionnaire searched for lower-energy and lower-fat items and reported changing their dietary intake as a result. All intervention group subjects who participated in a focus group (n=6) had favorable comments about using the CD-ROM for monitoring and changing eating habits, indicating that it is a beneficial self-monitoring tool. Participants enjoyed the immediate dietary feedback, and computerized food records may be easier to interpret by nutrition counselors. A number of computerized nutrient databases are available to assist patients and consumers in managing nutritional concerns.

  8. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  9. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  10. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  11. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  12. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  13. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    Science.gov (United States)

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  14. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  15. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Getting More Out of FID and SFA: A Strategy for More Effective Foreign Internal Defense and Security Force Assistance As a Way to Build Partnership Capacity

    Science.gov (United States)

    2015-04-13

    Africa and for tourists to visit Mali for the annual Festival in the Desert, a music festival that featured native Tuareg and other African music ...economic investment. Recent attacks by the Islamic State have threatened foreign investment and the tourism industry, highlighting the importance of

  19. A Study of Venezuela’s Internal and External Threat and the United States Security Assistance Program in the Build-Up and Modernization of Her Forces

    Science.gov (United States)

    1984-09-01

    percent of the popula- tion, leaving six percent of the population to other denominations; and (3) a literacy rate of 77 percent. The national language is...has focused on the improve- ment of Venezuela’s educational system. In 1958, the adult literarcy rate was 63 percent (20:320). Today the adult literacy ...hasta Marzo 1969. Oficina Central de Informacion . Caracas, Venezuela, 1969. 28. Penniman, Howard R. Venezuela at the Polls: The National Elections of

  20. Evaluating the Effectiveness of Waterside Security Alternatives for Force Protection of Navy Ships and Installations Using X3D Graphics and Agent-Based Simulation

    National Research Council Canada - National Science Library

    Sullivan, Patrick J

    2006-01-01

    The individuals charged with the task of planning, developing and implementing force protection measures both at the unit and installation level must consider numerous factors in formulating the best defensive posture...

  1. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  2. Providing haptic feedback in robot-assisted minimally invasive surgery: a direct optical force-sensing solution for haptic rendering of deformable bodies.

    Science.gov (United States)

    Ehrampoosh, Shervin; Dave, Mohit; Kia, Michael A; Rablau, Corneliu; Zadeh, Mehrdad H

    2013-01-01

    This paper presents an enhanced haptic-enabled master-slave teleoperation system which can be used to provide force feedback to surgeons in minimally invasive surgery (MIS). One of the research goals was to develop a combined-control architecture framework that included both direct force reflection (DFR) and position-error-based (PEB) control strategies. To achieve this goal, it was essential to measure accurately the direct contact forces between deformable bodies and a robotic tool tip. To measure the forces at a surgical tool tip and enhance the performance of the teleoperation system, an optical force sensor was designed, prototyped, and added to a robot manipulator. The enhanced teleoperation architecture was formulated by developing mathematical models for the optical force sensor, the extended slave robot manipulator, and the combined-control strategy. Human factor studies were also conducted to (a) examine experimentally the performance of the enhanced teleoperation system with the optical force sensor, and (b) study human haptic perception during the identification of remote object deformability. The first experiment was carried out to discriminate deformability of objects when human subjects were in direct contact with deformable objects by means of a laparoscopic tool. The control parameters were then tuned based on the results of this experiment using a gain-scheduling method. The second experiment was conducted to study the effectiveness of the force feedback provided through the enhanced teleoperation system. The results show that the force feedback increased the ability of subjects to correctly identify materials of different deformable types. In addition, the virtual force feedback provided by the teleoperation system comes close to the real force feedback experienced in direct MIS. The experimental results provide design guidelines for choosing and validating the control architecture and the optical force sensor.

  3. Optimal Aide Security Information Search (OASIS)

    National Research Council Canada - National Science Library

    Kapadia, Chetna

    2005-01-01

    The purpose of the Optimal AIDE Security Information Search (OASIS) effort was to investigate and prototype a tool that can assist the network security analyst in collecting useful information to defend the networks they manage...

  4. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  5. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  6. Zaštita računarskih mreža Ministarstva odbrane i Vojske Srbije primenom virtuelnog honeyneta / Security of computer network of the Ministry of Defence and the Serbian Armed Forces using virtual honeynets

    Directory of Open Access Journals (Sweden)

    Zoran Bobar

    2009-07-01

    Full Text Available U ovom radu obrađena je zaštita računarskih mreža u Ministarstvu odbrane i Vojsci Srbije primenom virtuelnog honeyneta. Zaštita je obrađena sa aspekta arhitekture računarskih mreža koje imaju pristup internetu. Predloženi koncept primene virtuelnog honeyneta uzima u obzir dostignuća nauke u ovoj oblasti u svetu, ostale primenjene metode i tehnike zaštite, mogućnosti i potrebe korisnika i elemente delova računarskog sistema Ministarstva odbrane i Vojske koji bi mogli biti meta napada sa udaljenih mesta globalne (internet mreže. / This paper covers the proposed solution for security of computer network in the Ministry of Defence and the Serbian Armed Forces using virtual honeynets. The security is covered from the aspect of the architecture of computer networks with Internet access. The proposed usage of virtual honeynets for protection takes into account the accomplishments of science in this field as well as security methods and techniques, users' needs and opportunities along with the computer network components of the MoD and the SAF that can be targets for attack.

  7. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    Science.gov (United States)

    2009-01-01

    by George Shultz, William Perry, Henry Kissinger, and Sam Nunn. These seasoned policy experts shocked many with their advocacy of a “world free of...NY: Kennikat Press, 1956); Alexander George and Richard Smoke , Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia...practiced abstinence in defense and security policy matters through the end of the 1990s—and why development of ESDP has proceeded only sluggishly since

  8. 东北老工业区生态安全动态演变过程及驱动力%Dynamic evolution and driving forces of ecological security in the Traditional Industrial Area of northeastern China

    Institute of Scientific and Technical Information of China (English)

    唐呈瑞; 逯承鹏; 杨青; 姜璐; 任婉侠; 薛冰

    2017-01-01

    Ecological security is as important as national,economic,and financial security and has become the main constraint of future socio-economic security.The Traditional Industrial Area of northeastern China is an important traditional industrial and grain production base of China,and its ecological security is related to the implementation of sustainable development strategies.Based on the emergy-ecological footprint model,the ecological security in Traditional Industrial Area of northeastern China was quantitatively evaluated from 2000 to 2014,followed by a scenario analysis on the driving forces of the ecological security using a principal component analysis method.The results showed that,the value of emergy ecological-capacity per capita decreased from 0.66 to 0.64 hm2/cap,whereas the emergy-ecological footprint increased from 10.58 to 19.85 hm2/cap,which indicated that an ecological deficit existed in the Traditional Industrial Area of northeastern China.The ecological pressure in this area increased,showing an unsustainable development trend from 2000 to 2014.The ecological pressure index and ecological security levels gradually increasing,ecological security situation is deteriorating,ecological security issues to be urgent resolved.The ecological stress tended to be serious as a result of a combination of several factors,such as social,economic,population,resource,environmental,technological level,and land use degree.Finally,effective management strategies and suggestions to improve the ecological security of the Traditional Industrial Area of northeastern China were proposed.%生态安全与国防安全、经济安全、金融安全等已具有同等重要的战略地位,并成为未来经济社会安全的主要约束.东北老工业区作为我国重要的老工业基地及粮食生产基地,其生态安全状况关系着中国可持续发展战略的实施.采用能值-生态足迹模型,对东北老工业区2000-2014年生态安全动态演变过程进行

  9. An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    Science.gov (United States)

    2008-12-01

    time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS

  10. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  11. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  12. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  13. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  14. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  15. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  16. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  17. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  18. Decree bringing into force Act n0 996 of 8 December 1970 providing regulations for aid and assistance to populations struck by catastrophes - Public welfare

    International Nuclear Information System (INIS)

    1981-01-01

    The purpose of this Decree is to provide a framework for aid and assistance at a local level, taking into account the decentralization following the creation in 1972 of autonomous administration in the regions. The provisions of thid Decree are of general application, and therefore cover nuclear emergencies, although they are not explicitly mentioned (NEA) [fr

  19. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  20. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  1. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  2. Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests

    Science.gov (United States)

    2010-03-11

    reaction border forces. The Georgian Border Police responded that there were no terrorists in the Gorge and retorted that “the Russian side has never...106 N.Bogdanova, “Azerbaijan, U.S. Develop Package of Proposals During Security Dialogue,” Trend News, November 5, 2009...Georgia since the August [2008] conflict. No part of the $1 billion U.S. assistance package went to the Ministry of Defense.”129 In addition, no FMF

  3. FEMA Individual Assistance Open Disaster Statistics

    Data.gov (United States)

    Department of Homeland Security — Individual Assistance (IA) is provided by the Federal Emergency Management Agency to individuals and families who have sustained losses due to disasters. Homeowners,...

  4. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. Information report on the behalf of the foreign affairs, defence and armed forces Commission on France security, nuclear disarmament and non proliferation

    International Nuclear Information System (INIS)

    2010-01-01

    This report first gives an overview of nuclear disarmament and non proliferation twenty years after the end of Cold War: evolution and status of Russia's and United States' nuclear weapon arsenals, France's and United Kingdom's trend to reduce their nuclear armament, reinforcement of China's nuclear armament, effects and limitations of the Non Proliferation Treaty (NPT). It notices that the new international context gave birth to some expectations and may lead to a lower nuclear pressure, notably with the influence of START negotiations between Russia and the United States, provided that the Comprehensive Nuclear Test Ban Treaty is ratified by more countries, and that negotiations promote a Fissile Material Cut-off Treaty. The report also outlines the importance of the promotion of better controlled peaceful uses of nuclear energy. It discusses the relationship between maintaining the world nuclear order and the reduction of international and regional tensions, and the importance of struggle against all forms of proliferation. It analyses the French nuclear posture in terms of security requirements, and in front of the zero nuclear option, in a context of ballistic missile proliferation, and in relationship with the issue of tactical nuclear weapons in Europe

  8. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  9. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  10. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  11. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  12. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  13. Driving Control for Electric Power Assisted Wheelchair Based on Regenerative Brake

    Science.gov (United States)

    Seki, Hirokazu; Takahashi, Kazuki; Tadakuma, Susumu

    This paper describes a novel safety driving control scheme for electric power assisted wheelchairs based on the regenerative braking system. “Electric power assisted wheelchair” which assists the driving force by electric motors is expected to be widely used as a mobility support system for elderly people and disabled people, however, the safe and secure driving performance especially on downhill roads must be further improved because electric power assisted wheelchairs have no braking devices. The proposed control system automatically switches the driving mode, from “assisting mode” to “braking mode”, based on the wheelchair's velocity and the declined angle and smoothly suppresses the wheelchair's acceleration based on variable duty ratio control in order to realize the safety driving and to improve the ride quality. Some experiments on the practical roads and subjective evaluation show the effectiveness of the proposed control system.

  14. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  15. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  16. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  17. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  18. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  19. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  20. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  1. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  2. FEMA Housing Assistance Renters - API

    Data.gov (United States)

    Department of Homeland Security — This dataset lists aggregated, non-PII dataset of FEMA Housing Assistance Program for House Renters The data was generated by FEMA's ECIM (Enterprise Coordination...

  3. Radiological Assistance Program (RAP) Regions

    Data.gov (United States)

    Department of Homeland Security — The U.S. Department of Energy (DOE) created the Radiological Assistance Program (RAP) in the 1950s to make DOE resources and expertise available to organizations...

  4. FEMA Housing Assistance Owners - API

    Data.gov (United States)

    Department of Homeland Security — This dataset lists aggregated, non-PII dataset of FEMA Housing Assistance Program for House Owners The data was generated by FEMA's ECIM (Enterprise Coordination...

  5. THE PECULIARITIES OF CALCULATION AND RECORDING IN ACCOUNTING ASSISTANCE OF TEMPORARY DISABILITY DURING 2015 AND THE PROSPECT OF FURTHER REFORMING SOCIAL SECURITY IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Yanina Nikitina

    2015-11-01

    depending on length of service employee, and display of the received sums of money on accounts in different periods in 2015. Value/originality. The results of this research allow to structure accounting information according to the process of calculating monetary aid on disability and create a basis for further researches and prolonging reforms of social security in Ukraine, according to proposed directions.

  6. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  7. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  8. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  9. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  10. Security of material. The changing context of the IAEA's programme

    International Nuclear Information System (INIS)

    Nilsson, Anita

    2001-01-01

    When the IAEA established its programme on the Security of Material about five years ago, the prospect that nuclear or other radioactive materials could fall into the wrong hands was a main concern. Among the major driving forces behind the Agency's action then was an alarming increase in reported cases of illicit nuclear trafficking in the early and mid-1990s, and the recognition that States needed better and more coordinated assistance in their efforts to combat the problem. Today, the dimensions and perceptions of nuclear security are being shaped by additional driving forces, specifically the spectre of nuclear terrorism. The terrorist attacks on the United States in September 2001 have elevated issues of security to unprecedented heights of international concern and they have prompted a broad-based global response. The attacks made it clear that terrorism has new and far-reaching international dimensions and that its aim of inflicting mass casualties is a serious threat for all States. In the nuclear sphere, the IAEA has taken a leading role in international efforts directed at combating nuclear terrorism. Initiatives taken by the Agency aim to upgrade levels of security for nuclear facilities and the protection of nuclear and other radioactive materials. Toward these ends, the IAEA Board of Governors is considering proposed measures for strengthening the Agency's activities relevant to preventing nuclear terrorism. In this new and challenging context, it is worth reviewing some fundamental aspects of the IAEA programme on Security of Material as it has been developed over the years. The programme is part of a wider framework of Agency activities related to nuclear security, safety, and safeguards. In reviewing the programme's evolution, this article principally focuses on the major components and elements of the planned 2002-2003 programme, while pointing to directions ahead in light of additional measures being considered for prevention of nuclear terrorism

  11. Computer Security Incident Response Planning at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    The purpose of this publication is to assist Member States in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme, and considers the roles and responsibilities of the system owner, operator, competent authority, and national technical authority in responding to a computer security incident with possible nuclear security repercussions

  12. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  13. The development and significance of the DOE Safeguards and Security standards and criteria

    International Nuclear Information System (INIS)

    Toman, J.

    1987-01-01

    In October 1985, the DOE Assistant Secretary for Defense Programs created a task force to develop inspection standards and criteria for Safeguards and Security. These standards and criteria (S/C) would provide the DOE Inspection and Evaluation (I and E) teams with the guidance needed to assess the security posture of DOE's nuclear and other important facilities. The Lawrence Livermore National Laboratory was designated the lead management organization for the structuring, administration, and execution of the overall task force effort and appointed the Executive Secretary. The Office of Security Evaluations (OSE) became the responsible DOE organization, and its Director assumed the role of Chairman of the Task Force Executive Committee. At its peak, the Task Force consisted of approximately 200 people who were considered to be experts in eight major topical areas. The composition of the experts was almost evenly divided between DOE and contractor employees. The collective wisdom of these experts was used in a consensus process to develop the S/C that are now published in draft form. These S/C have been used in more than ten inspections since May 1986 with much success. This paper discusses the process used to achieve the desired end result and the significance of the Task Force's accomplishments

  14. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  15. Air Force Officer Force Development, an Analysis and Future Issues

    National Research Council Canada - National Science Library

    Davidson, William T

    2004-01-01

    .... The intent is to identify any shortcomings in the construct, highlight processes requiring change, and assist the Air Force in building the road to a more robust, better educated, and visionary officer corps...

  16. TAO2000 V2 computer-assisted force feedback tele-manipulators used as maintenance and production tools at the AREVA NC-La Hague fuel recycling plant

    International Nuclear Information System (INIS)

    Geffard, Franck; Garrec, Philippe; Piolain, Gerard; Brudieu, Marie-Anne; Thro, Jean-Francois; Coudray, Alain; Lelann, Eric

    2012-01-01

    During a 15-year joint research program, French Atomic Energy Agency Interactive Robotics Laboratory (CEA LIST) and AREVA have developed several remote operation devices, also called tele-robots. Some of them are now commonly used for maintenance operations at the AREVA NC (Nuclear Cycle) La Hague reprocessing plant. Since the first maintenance operation in 2005, several other successful interventions have been realized using the industrial MA23/RX170 tele-manipulation system. Moreover, since 2010, the through-the-wall tele-robot named MT200 TAO based on the slave arm of the MSM MT200 (La Calhene TM ), has been evaluated in an active production cell at the AREVA NC La Hague fuel recycling plant. Although these evaluations are ongoing, the positive results obtained have led to an update and industrialization program. All these developments are based on the same generic control platform, called TAO2000 V2. TAO2000 V2 is the second release of the CEA LIST core software platform dedicated to computer aided force-feedback tele-operation (TAO is the French acronym for computer aided tele-operation). This paper presents all these developments resulting from the joint research program CEA LIST/AREVA. The TAO2000 V2 controller is first detailed, and then two maintenance operations using the industrial robot RX170 are presented: the removal of the nuclear fuel dissolver wheel rollers and the cleanup of the dissolver wheel inter-bucket spaces. Finally, the new MT200 TAO system and its evaluations at the AREVA NC La Hague facilities are discussed. (authors)

  17. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  18. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  19. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  20. Photo-assisted Kelvin probe force microscopy investigation of three dimensional GaN structures with various crystal facets, doping types, and wavelengths of illumination

    Science.gov (United States)

    Ali Deeb, Manal; Ledig, Johannes; Wei, Jiandong; Wang, Xue; Wehmann, Hergo-Heinrich; Waag, Andreas

    2017-08-01

    Three dimensional GaN structures with different crystal facets and doping types have been investigated employing the surface photo-voltage (SPV) method to monitor illumination-induced surface charge behavior using Kelvin probe force microscopy. Various photon energies near and below the GaN bandgap were used to modify the generation of electron-hole pairs and their motion under the influence of the electric field near the GaN surface. Fast and slow processes for Ga-polar c-planes on both Si-doped n-type as well as Mg-doped p-type GaN truncated pyramid micro-structures were found and their origin is discussed. The immediate positive (for n-type) and negative (for p-type) SPV response dominates at band-to-band and near-bandgap excitation, while only the slow process is present at sub-bandgap excitation. The SPV behavior for the semi-polar facets of the p-type GaN truncated pyramids has a similar characteristic to that on its c-plane, which indicates that it has a comparable band bending and no strong influence of the polarity-induced charges is detectable. The SPV behavior of the non-polar m-facets of the Si-doped n-type part of a transferred GaN column is similar to that of a clean c-plane GaN surface during illumination. However, the SPV is smaller in magnitude, which is attributed to intrinsic surface states of m-plane surfaces and their influence on the band bending. The SPV behavior of the non-polar m-facet of the slightly Mg-doped part of this GaN column is found to behave differently. Compared to c- and r-facets of p-type surfaces of GaN-light-emitting diode micro-structures, the m-plane is more chemically stable.

  1. Developing Sustainable Afghan National Security Forces

    Science.gov (United States)

    2012-06-08

    codifies approved methods and techniques throughout an organization. “Doctrine is accepted corporate knowledge; it is authoritative . By definition...doctrine provides authoritative guidance on how the organization ought to operate with current capabilities. It therefore provides the basis for...nutrition; and infant, child, and maternal mortality. . . . Furthermore, Afghanistan’s prospects for growth are severely limited by weak economic

  2. Security Forces of the Kurdistan Regional Government

    Science.gov (United States)

    2009-02-26

    crisp uniforms. Those in the lower...ur o M em be r. G en er al S ta ff R eg io na l C om m an ds Fu nc tio na l C om m an ds P re si de nc y C ou nc il O pe ra tio ns (G 3) A dm in is...nc y C ou nc il O pe ra tio ns (G 3) A dm in is tra tio n/ Lo gi st ic s (G 1/ G 4) P es hm er ga M in is te r* Fi na nc e In sp ec to r G en er al

  3. Government/Industry Partnership on the Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Cefus, Greg; Colhoun, Stefan C.; Freier, Keith D.; Wright, Kyle A.; Herdes, Gregory A.

    2006-01-01

    In the past, industry radiation protection programs were built almost exclusively around radiation safety and the minimization of radiation dose exposure to employees. Over the last decade, and especially the last few years, the emphasis has shifted to include the physical security and enhanced control of radioactive materials. The threat of nuclear and radiological terrorism is a genuine international security concern. In May 2004, the U.S. Department of Energy/U.S. National Nuclear Security Administration unveiled the Global Threat Reduction Initiative (GTRI) to respond to a growing international concern for the proper control and security of radioactive and nuclear materials. An integral part of the GTRI, the International Radiological Threat Reduction (IRTR) Program, was established in February 2002, originally as a Task Force. The IRTR Program is foremost a government-to-government cooperative program with the mission to reduce the risk posed by vulnerable radioactive materials that could be used in a Radioactive Dispersal Device (RDD). However, governments alone cannot prevent the misuse and illicit trafficking of radioactive sources. By expanding the role of private industry as a partner, existing government regulatory infrastructures can be enhanced by formulating and adopting industry self-regulation and self-policing measures. There is international concern regarding the security and control of the vast number of well-logging sources used during oil exploration operations. The prevalence of these sources, coupled with their portability, is a legitimate security concern. The energy exploration industry has well established safety and security protocols and the IRTR Program seeks to build on this foundation. However, the IRTR Program does not have sufficient resources to address the issue without industry assistance, so it is looking to the oil and gas industry to help identify alternative means for accomplishing our mutual objectives. This paper describes

  4. Subatomic forces

    International Nuclear Information System (INIS)

    Sutton, C.

    1989-01-01

    Inside the atom, particles interact through two forces which are never felt in the everyday world. But they may hold the key to the Universe. These ideas on subatomic forces are discussed with respect to the strong force, the electromagnetic force and the electroweak force. (author)

  5. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  6. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  7. DoD Security Assistance Management Manual

    Science.gov (United States)

    1988-10-01

    TOPSECRET SECRET CONFIEI(IlAL RESTWICIE Chile SECRETO SECRE11O RESERVADO RESERVADO Columbia ULTRASECREFO SECREIO RESERVADO CONFIDCAL RESTRIN4GEDO Costa Rica...Republic of CV AT APR F T Cayman Islands (UK) CJ AT AR Central African Republic eI EU APR F T Chad CD EU APR F T Chile CI so AR F U China CH PA EAP F U...FIRE DIRECTION CONTROL CENTER OFCV) (A) 3,382 21MAY86 . CATEGORY VIH - - AIRCRAFT. SPACECRAFT AND ASSOCIATED EQUIPMENT AIRCRAFT 767 AWACS (AF) 8,700,000

  8. Mobile Assisted Security in Wireless Sensor Networks

    Science.gov (United States)

    2015-08-03

    machine. In order to connect to Chromecast, Google’s official Chromecast app is installed to the Android tablet from Google PlayStore . Additionally...NeoMediacast HDMI Dongle [11] is another HDMI stick, which is about to be re- leased to the market. It runs Android OS and is decorated with the...knowledge, there has been no evaluation of the Chromecast device in the literature. Chromecast runs a stripped-down version of Android OS, with limited

  9. Development of mechanical brake assist; Mechanical brake assist no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Konishi, M; Shingyoji, S; Nakamura, I; Tagawa, T; Saito, Y; Ishihara, T; Kobayashi, S; Yoshida, M [Nissan Motor Co. Ltd., Tokyo (Japan)

    1997-10-01

    We have recognized that there are drivers who cannot apply strong brake pedal force , in spite of the necessity of hard braking in emergencies. We have developed a `mechanical brake assist system` which assists drivers appropriately, according to the drivers` characteristics based on studying the characteristic`s of conditions of drivers applying the brake pedal force in emergency conditions. 2 refs., 7 figs., 1 tab.

  10. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  11. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  12. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  13. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  14. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  15. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  16. Conducting Computer Security Assessments at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    Computer security is increasingly recognized as a key component in nuclear security. As technology advances, it is anticipated that computer and computing systems will be used to an even greater degree in all aspects of plant operations including safety and security systems. A rigorous and comprehensive assessment process can assist in strengthening the effectiveness of the computer security programme. This publication outlines a methodology for conducting computer security assessments at nuclear facilities. The methodology can likewise be easily adapted to provide assessments at facilities with other radioactive materials

  17. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  18. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  20. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  1. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  2. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  3. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  4. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  5. Intelligent assistive robots recent advances in assistive robotics for everyday activities

    CERN Document Server

    Moreno, Juan; Kong, Kyoungchul; Amirat, Yacine

    2015-01-01

    This book deals with the growing challenges of using assistive robots in our everyday activities along with providing intelligent assistive services. The presented applications concern mainly healthcare and wellness such as helping elderly people, assisting dependent persons, habitat monitoring in smart environments, well-being, security, etc. These applications reveal also new challenges regarding control theory, mechanical design, mechatronics, portability, acceptability, scalability, security, etc.  

  6. 7 CFR 1421.404 - Financial security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial security. 1421.404 Section 1421.404...-MARKETING ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 Designated Marketing Associations for Peanuts § 1421.404 Financial security. In order to be approved to handle loans and loan...

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  9. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  10. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  11. FEMA Hazard Mitigation Assistance Severe Repetitive Loss (SRL) Data

    Data.gov (United States)

    Department of Homeland Security — This dataset contains closed and obligated projects funded under the following Hazard Mitigation Assistance (HMA) grant programs: Severe Repetitive Loss (SRL). The...

  12. FEMA Hazard Mitigation Assistance Repetitive Flood Claims (RFC) Data

    Data.gov (United States)

    Department of Homeland Security — This dataset contains closed and obligated projects funded under the following Hazard Mitigation Assistance (HMA) grant programs: Repetitive Flood Claims (RFC). The...

  13. Electrostatic force assisted deposition of graphene

    Science.gov (United States)

    Liang, Xiaogan [Berkeley, CA

    2011-11-15

    An embodiment of a method of depositing graphene includes bringing a stamp into contact with a substrate over a contact area. The stamp has at least a few layers of the graphene covering the contact area. An electric field is developed over the contact area. The stamp is removed from the vicinity of the substrate which leaves at least a layer of the graphene substantially covering the contact area.

  14. Joint Forces Command - United Assistance Fiscal Triad

    Science.gov (United States)

    2016-05-17

    determine the division of labor and any additional training that would be required before deploying. The Logistics Civil Augmentation Program (LOGCAP...had established for operations in Afghanistan and Iraq. AFRICOM did not have a dedicated funds cen- ter in the General Fund Enterprise Business ...AT UR ES FE AT UR ES al U.S. military personnel and their equipment. Commercial Shipping Demands to ship test, measure- ment, and diagnostic

  15. Developing Iraq's Security Sector: The Coalition Provisional Authority's Experience

    National Research Council Canada - National Science Library

    Rathmell, Andrew; Oliker, Olga; Kelly, Terrence K; Brannan, David; Crane, Keith

    2005-01-01

    .... The environment was not benign -- it was deteriorating. Iraqi security forces had largely disintegrated, and those that remained were incapable of responding to rising criminality and political violence...

  16. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  17. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  18. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  19. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  20. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  1. 76 FR 10610 - Federal Property Suitable as Facilities To Assist the Homeless

    Science.gov (United States)

    2011-02-25

    ... Force Property Number: 18200820001 Status: Unutilized Reasons: Secured Area Bldg. 3224 Eielson AFB Eielson AK 99702 Landholding Agency: Air Force Property Number: 18200820002 Status: Unutilized Reasons: Secured Area, Extensive deterioration Bldgs. 1437, 1190, 2375 Eielson AFB Eielson AK [[Page 10613...

  2. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  3. Assistive Technology

    Science.gov (United States)

    ... Page Resize Text Printer Friendly Online Chat Assistive Technology Assistive technology (AT) is any service or tool that helps ... be difficult or impossible. For older adults, such technology may be a walker to improve mobility or ...

  4. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  5. Privatisation of security:

    DEFF Research Database (Denmark)

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  6. Private Military and Security Contractors

    DEFF Research Database (Denmark)

    In Private Military and Security Contractors: Controlling the Corporate Warrior a multinational team of 16 scholars and a practitioner from political science, sociology, and law address a developing phenomenon: controlling the use of privatized force by states in international politics. Robust...

  7. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  8. Assisted Living

    Science.gov (United States)

    ... it, too. Back to top What is the Cost for Assisted Living? Although assisted living costs less than nursing home ... Primarily, older persons or their families pay the cost of assisted living. Some health and long-term care insurance policies ...

  9. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  10. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  11. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2012

    2012-01-01

    The labor force is the number of people ages 16 or older who are either working or looking for work. It does not include active-duty military personnel or the institutionalized population, such as prison inmates. Determining the size of the labor force is a way of determining how big the economy can get. The size of the labor force depends on two…

  12. Force 2025 and Beyond Strategic Force Design Analytic Model

    Science.gov (United States)

    2017-01-12

    focused thinking , functional hierarchy, task capability matching 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT U 18. NUMBER OF...describe and evaluate current organizational designs in terms of Force Employment and Force Design using the model to offer recommendations and analysis...developed to illuminate the current organizational design structure to better understand how the network of BCTs and enablers function in today’s steady

  13. Civil control over the security institutions in South Africa ...

    African Journals Online (AJOL)

    security policy. The main aim of this article is therefore to assist critical new thinking regarding security.6. Then, to draw policy implications for the governance of security and intelligence ...... network of institutions and relationships that involve vertical and horizontal accountability . Important is Karl s observation that ...

  14. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  15. 45 CFR 205.52 - Furnishing of social security numbers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The... furnish to the State or local agency a social security account number, hereinafter referred to as the SSN...

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. Dispersion Forces

    CERN Document Server

    Buhmann, Stefan Yoshi

    2012-01-01

    In this book, a modern unified theory of dispersion forces on atoms and bodies is presented which covers a broad range of advanced aspects and scenarios. Macroscopic quantum electrodynamics is shown to provide a powerful framework for dispersion forces which allows for discussing general properties like their non-additivity and the relation between microscopic and macroscopic interactions. It is demonstrated how the general results can be used to obtain dispersion forces on atoms in the presence of bodies of various shapes and materials. Starting with a brief recapitulation of volume I, this volume II deals especially with bodies of irregular shapes, universal scaling laws, dynamical forces on excited atoms, enhanced forces in cavity quantum electrodynamics, non-equilibrium forces in thermal environments and quantum friction. The book gives both the specialist and those new to the field a thorough overview over recent results in the field. It provides a toolbox for studying dispersion forces in various contex...

  19. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  20. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    Noro, Naoko

    2013-01-01

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  1. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  2. Mental health challenges of LGBT forced migrants

    Directory of Open Access Journals (Sweden)

    Ariel Shidlo

    2013-04-01

    Full Text Available Many LGBT forced migrants have significant and sometimesincapacitating psychological scars. Mental health providers can assistin documenting the psychological impact of anti-LGBT persecutionand its impact on the ability to secure refugee status.

  3. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  4. Space and Air Force: Rhetoric or Reality

    National Research Council Canada - National Science Library

    Cashin, James

    1999-01-01

    ... to meet requirements set forth in the National Security Strategy (NSS). Joint Vision 2010, the Air Force's Global Engagement, and several long-range plans all establish requirements that can only be fulfilled through the application of spacepower...

  5. Countering North Korean Special Purpose Forces

    National Research Council Canada - National Science Library

    Krause, Troy

    1999-01-01

    As United States and Republic of Korea forces stand to defend against a DPRK attack, one of the most formidable tasks is how to counter a second front in the Joint Rear Security Area of the Republic of Korea...

  6. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  9. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  10. 20 CFR 416.1157 - Support and maintenance assistance.

    Science.gov (United States)

    2010-04-01

    ... Section 416.1157 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... agency designated by the chief executive officer of the State to handle the State's responsibilities as... maintenance as defined in § 416.1121(h). Support and maintenance assistance includes home energy assistance...

  11. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  12. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  13. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  14. Labor force activity after 60

    DEFF Research Database (Denmark)

    Pedersen, Peder J.; Larsen, Mona

    2015-01-01

    of reference. Main emphasis is given to the development in two distint age groups, i.e. people in the first half of the 60s of which many are eligible for early retirement programs and people older than 65 mostly eligible for social security retirement programs. For these two age groups the actual development...... in labor force participation is described based on register data and on labor force surveys along with indicators of cohort relevant changes in education and health. Focus in the paper includes also the gender aspect to accommodate stronger cohort effects for women than for men. The impact on labor force...

  15. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  16. Different forces

    CERN Multimedia

    1982-01-01

    The different forces, together with a pictorial analogy of how the exchange of particles works. The table lists the relative strength of the couplings, the quanta associated with the force fields and the bodies or phenomena in which they have a dominant role.

  17. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2010

    2010-01-01

    The labor force is the number of people aged 16 or older who are either working or looking for work. It does not include active-duty military personnel or institutionalized people, such as prison inmates. Quantifying this total supply of labor is a way of determining how big the economy can get. Labor force participation rates vary significantly…

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  20. 78 FR 70244 - Electronic Interim Assistance Reimbursement Program

    Science.gov (United States)

    2013-11-25

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Background To be... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2011-0104] RIN 0960-AH45 Electronic Interim Assistance Reimbursement Program AGENCY: Social Security Administration. ACTION: Notice of...

  1. Tracing the Interface Between Numerical Flexibility and Income Security for European Youth during the Economic Crisis

    DEFF Research Database (Denmark)

    Leschke, Janine; Finn, Mairéad

    benefit schemes. This paper adopts a comparative European approach in order to shed light on the interaction between flexibility and income security, for youth. Special extracts of the aggregate European Labour Force Survey data are used to trace the development of (involuntary) temporary employment among...... duration than adults. In a majority of EU countries youth are also disadvantaged with regard to unemployment benefits. Eligibility criteria require a certain minimum period in employment before unemployment insurance benefits can be accessed; and means-testing applies to unemployment and social assistance...... underexplored. This allows us to assess if developments during the economic crisis have improved or rather deteriorated the situation of youth with regard to different dimension of flexibility and security....

  2. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  3. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  4. Almaraz ovation control system security

    Energy Technology Data Exchange (ETDEWEB)

    Madronal Rodriguez, E.; Anderson, E.; Jimenez Diaz, J.; Carrasco Mateos, J. A.

    2013-07-01

    Improving the security of a plant's Distributed Control System (DCS) is an important consideration for plant safety and profitability, as well as the necessity to comply with the regulation. The U.S. Nuclear Regulatory Commission has produced Regulatory Guide (RG) 5.71, and the Nuclear Energy Institute (NEI) has produced NEI 08-09 to assist plants in meeting 10 CFR 73.54, Protection of digital computer and communication systems and networks. These requirements, which address the establishment, implementation and maintenance of a cyber security program, present challenges to ensure that safety, security and emergency preparedness functions of nuclear facilities are not negatively impacted by the vulnerability scanning and testing process.

  5. Almaraz ovation control system security

    International Nuclear Information System (INIS)

    Madronal Rodriguez, E.; Anderson, E.; Jimenez Diaz, J.; Carrasco Mateos, J. A.

    2013-01-01

    Improving the security of a plant's Distributed Control System (DCS) is an important consideration for plant safety and profitability, as well as the necessity to comply with the regulation. The U.S. Nuclear Regulatory Commission has produced Regulatory Guide (RG) 5.71, and the Nuclear Energy Institute (NEI) has produced NEI 08-09 to assist plants in meeting 10 CFR 73.54, Protection of digital computer and communication systems and networks. These requirements, which address the establishment, implementation and maintenance of a cyber security program, present challenges to ensure that safety, security and emergency preparedness functions of nuclear facilities are not negatively impacted by the vulnerability scanning and testing process.

  6. International assistance. Licensing assistance project

    International Nuclear Information System (INIS)

    Aleev, A.

    1999-01-01

    Description of licensing assistance project for VATESI is presented. In licensing of unit No.1 of INPP VATESI is supported by many western countries. Experts from regulatory bodies or scientific organizations of those countries assist VATESI staff in reviewing documentation presented by INPP. Among bilateral cooperation support is provided by European Commission through Phare programme

  7. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  8. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  9. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  10. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  11. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  12. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  13. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  14. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  15. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  16. Safeguards and security modeling for electrochemical plants

    International Nuclear Information System (INIS)

    Cipiti, B.B.; Duran, F.A.; Mendoza, L.A.; Parks, M.J.; Dominguez, D.; Le, T.D.

    2013-01-01

    Safeguards and security design for reprocessing plants can lead to excessive costs if not incorporated early in the design process. The design for electrochemical plants is somewhat uncertain since these plants have not been built at a commercial scale in the past. The Separation and Safeguards Performance Model (SSPM), developed at Sandia National Laboratories, has been used for safeguards design and evaluation for multiple reprocessing plant types. The SSPM includes the following capabilities: -) spent fuel source term library, -) mass tracking of elements 1-99 and bulk solid/liquids, -) tracking of heat load and activity, -) customisable measurement points, -) automated calculation of ID and error propagation, -) alarm conditions and statistical tests, and -) user-defined diversion scenarios. Materials accountancy and process monitoring data can provide more timely detection of material loss specifically to protect against the insider threat. While the SSPM is capable of determining detection probabilities and examining detection times for material loss scenarios, it does not model the operations or spatial effects for a plant design. The STAGE software was chosen to model the physical protection system. STAGE provides a framework to create end-to-end scalable force-on-force combat simulations. It allows for a complete 3D model of a facility to be designed along with the design of physical protection elements. This software, then, can be used to model operations and response for various material loss scenarios. The future integration of the SSPM model data with the STAGE software will provide a more complete analysis of diversion scenarios to assist plant designers

  17. Safeguards and security modeling for electrochemical plants

    Energy Technology Data Exchange (ETDEWEB)

    Cipiti, B.B.; Duran, F.A.; Mendoza, L.A.; Parks, M.J.; Dominguez, D.; Le, T.D. [Sandia National Laboratories, PO Box 5800 MS 0747, Albuquerque, NM 87185 (United States)

    2013-07-01

    Safeguards and security design for reprocessing plants can lead to excessive costs if not incorporated early in the design process. The design for electrochemical plants is somewhat uncertain since these plants have not been built at a commercial scale in the past. The Separation and Safeguards Performance Model (SSPM), developed at Sandia National Laboratories, has been used for safeguards design and evaluation for multiple reprocessing plant types. The SSPM includes the following capabilities: -) spent fuel source term library, -) mass tracking of elements 1-99 and bulk solid/liquids, -) tracking of heat load and activity, -) customisable measurement points, -) automated calculation of ID and error propagation, -) alarm conditions and statistical tests, and -) user-defined diversion scenarios. Materials accountancy and process monitoring data can provide more timely detection of material loss specifically to protect against the insider threat. While the SSPM is capable of determining detection probabilities and examining detection times for material loss scenarios, it does not model the operations or spatial effects for a plant design. The STAGE software was chosen to model the physical protection system. STAGE provides a framework to create end-to-end scalable force-on-force combat simulations. It allows for a complete 3D model of a facility to be designed along with the design of physical protection elements. This software, then, can be used to model operations and response for various material loss scenarios. The future integration of the SSPM model data with the STAGE software will provide a more complete analysis of diversion scenarios to assist plant designers.

  18. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  19. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Kuhn, D

    2002-01-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication...

  20. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  1. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  2. Force generation by titin folding.

    Science.gov (United States)

    Mártonfalvi, Zsolt; Bianco, Pasquale; Naftz, Katalin; Ferenczy, György G; Kellermayer, Miklós

    2017-07-01

    Titin is a giant protein that provides elasticity to muscle. As the sarcomere is stretched, titin extends hierarchically according to the mechanics of its segments. Whether titin's globular domains unfold during this process and how such unfolded domains might contribute to muscle contractility are strongly debated. To explore the force-dependent folding mechanisms, here we manipulated skeletal-muscle titin molecules with high-resolution optical tweezers. In force-clamp mode, after quenching the force (force trace contained rapid fluctuations and a gradual increase of average force, indicating that titin can develop force via dynamic transitions between its structural states en route to the native conformation. In 4 M urea, which destabilizes H-bonds hence the consolidated native domain structure, the net force increase disappeared but the fluctuations persisted. Thus, whereas net force generation is caused by the ensemble folding of the elastically-coupled domains, force fluctuations arise due to a dynamic equilibrium between unfolded and molten-globule states. Monte-Carlo simulations incorporating a compact molten-globule intermediate in the folding landscape recovered all features of our nanomechanics results. The ensemble molten-globule dynamics delivers significant added contractility that may assist sarcomere mechanics, and it may reduce the dissipative energy loss associated with titin unfolding/refolding during muscle contraction/relaxation cycles. © 2017 The Protein Society.

  3. STRONG POINTS AND INTERNAL AND EXTERNAL VULNERABILITIES OF THE MILITARY COMMUNICATIONS AND INFORMATICS SYSTEMS AND NETWORKS DEVELOPED IN THE ROMANIAN ARMED FORCES UNDER THE CIRCUMSTANCES OF THE CURRENT SECURITY CHALLENGES

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2015-12-01

    Full Text Available The author briefly presents a series of recent aspects in the current geopolitical context regarding some strong points as well as internal and external vulnerabilities of the military communication and informatics systems and networks developed in the Romanian Armed Forces since 1997. In the second section we referred to the evolutions in austerity and hostility conditions of the main operational and technical sequels of Romanian Armed Forces Transmissions System - STAR (RTP/RMNC. Furthermore, we presented some strong points of the achieved systems and principles taken into account along the modernization and transformation effort (regarding the NATO criteria and requirements, as well as their internal and external vulnerabilities identified following a thorough analysis.

  4. American Recovery and Reinvestment Act (ARRA) FEMP Technical Assistance U.S. Army – Project 214 Analysis of Regulations Associated with Implementation of a Rocky Mountain Secure Smart-Grid

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, William M.

    2010-09-30

    This document describes technical assistance provided by PNNL to further develop a smart grid technologies concept to provide a basis for policies and plans for the US Army. The effort was to analyze the potential to utilize emerging smart grid technologies along with indigenous renewable and other resources to meet the emergency and other power needs of Department of Defense facilities in Colorado and Wyoming.

  5. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  6. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  7. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. Unliquidated Obligations for Air Force-Funded Projects Administered by The Naval Facilities Engineering Command

    National Research Council Canada - National Science Library

    2001-01-01

    ... consolidated financial statements. The Air Force Audit Agency requested us to assist in its review of the Statement of Budgetary Resources for the Air Force General Fund by reviewing unliquidated obligations for Air Force-funded...

  9. Nuclear forces

    International Nuclear Information System (INIS)

    Holinde, K.

    1990-01-01

    In this paper the present status of the meson theory of nuclear forces is reviewed. After some introductory remarks about the relevance of the meson exchange concept in the era of QCD and the empirical features of the NN interaction, the exciting history of nuclear forces is briefly outlined. In the main part, the author gives the basic physical ideas and sketch the derivation of the one-boson-exchange model of the nuclear force, in the Feynman approach. Secondly we describe, in a qualitative way, various necessary extensions, leading to the Bonn model of the N interaction. Finally, points to some interesting pen questions connected with the extended quark structure of the hadrons, which are topics of current research activity

  10. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  11. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  12. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  13. 77 FR 39249 - Boston Area Maritime Security Advisory Committee; Vacancies

    Science.gov (United States)

    2012-07-02

    ... Purpose The AMSCs shall assist the Captain of the Port in the development, review, update, and exercising..., including labor; other port stakeholders having a special competence in maritime security; and port...

  14. 7 CFR 1980.333 - Promissory notes and security instruments.

    Science.gov (United States)

    2010-01-01

    ... promissory notes, real estate mortgages, including deeds of trust and similar instruments, and security... Interest Assistance Agreement, assure that the closing agent properly records a junior mortgage or deed of...

  15. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  16. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  17. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  18. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  1. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  2. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  3. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  4. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  5. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  6. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  7. THE MASS MEDIA’S BEARING ON THE RESOLUTION OF POST-INDEPENDENCE SECURITY ISSUES IN NIGERIA

    Directory of Open Access Journals (Sweden)

    Osakue Stevenson Omoera

    2017-09-01

    Full Text Available Conceptualising national security continues to be a taxing undertaking as a range of factors point up its capacity at all levels of perception, and thus, cannot be restricted to a single definition due to its changing nature from one nation-state to another. Therefore, national security remains dynamic, fluid and multi-directional, but it is critical to the survival of any nation-state. In post-independence Nigeria, security threats to its national interests not only involve conventional threats such as the ones from other nation-states but also non-state actors and activities such as terrorists, arms dealers, pirates, heists, drug traffickers, kidnappers, street gangster insurgencies, border disputes and ethnic militias. Over the past fifty six years or so, traditional threats to national security in Nigeria have metamorphosed into grave security behemoths, which apparently cannot be eliminated by military forces or security institutions alone. The mass media have been suggested to have the capacity to contribute meaningfully towards assisting security institutions in eliminating or checking the security challenges, which the country is confronted with.  Perhaps, this is because the media are an integral part of the soft power infrastructure, which could facilitate the dissemination of information in a fast and effective way, thereby helping a nation such as Nigeria to put together the appropriate political action that is aimed at entrenching the desired national security. Deploying the agenda setting and framing theories, this article undertakes an appraisal of whether or not the Nigerian mass media (specifically, Daily Trust and The Punch have made impactful contributions toward the resolution of security issues in post-independence Nigeria, with a particular reference to the Boko Haram sect(s’ insurgencies. It employs analytic, in-depth interviews (IDIs and historical methods to look at some media reports on the insurgencies with the aim

  8. (Congressional Interest) Institute for Science, Space and Security (ISSS)

    Science.gov (United States)

    2012-03-19

    Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees

  9. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  10. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  11. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  12. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  14. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  15. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  16. National Institute of Justice (NIJ) Center Requirements Definition, Technical Assistance, and Analysis

    National Research Council Canada - National Science Library

    Frantz, Frederick

    2003-01-01

    .... The current technology thrust areas for the Northeast Region are Concealed Weapons Detection, Secure Communications, Computer Forensics, Information Management, AGILE, and various technical assistance projects...

  17. Assisted Living

    Science.gov (United States)

    ... a resident's needs depends as much on the philosophy and services of the assisted living facility as it does on the quality of care. The Administration on Aging, a part of the U.S. Department of Health and Human Services (HHS), offers these suggestions to help you ...

  18. Assistive Devices

    Science.gov (United States)

    If you have a disability or injury, you may use a number of assistive devices. These are tools, products or types of equipment that help you perform tasks and activities. They may help you move around, see, communicate, eat, or get ...

  19. National security and the accelerating risk of climate change

    Directory of Open Access Journals (Sweden)

    Lee Gunn

    2017-06-01

    Full Text Available Since 2006, retired U.S. admirals and generals have been examining our changing physical world and assessing the impact of those changes on the security of the nation. A Military Advisory Board (MAB, convened by the CNA Corporation, a non-profit research and analysis institution that operates the Center for Naval Analyses and Institute for Public Research has issued two reports on the changing climate’s national security implications. The first report, published in 2007, stated that the changing climate would be destabilizing in many parts of the world. Climate change, in fact, would be a “threat multiplier”, the report claimed, and result in new and more urgent calls for the American military to provide humanitarian assistance and disaster relief (HADR as well as help sustain order and ensure conditions that would permit trade and prosperity worldwide. The MAB recommended urgent action by the Defense Department to prepare for new missions in new places; and that the Defense Department explicitly recognize missions stemming from the changing climate. CNA’s MAB then published three reports on energy, relating to climate change, one each on: the coming age of renewables, the nation’s energy dependence, and the future of energy in terms of America’s international competitiveness (CNA-MAB, 2009; CNA-MAB, 2010; CNA-MAB, 2011. In 2014, the Military Advisory Board noted that the climate was changing more quickly than had been forecast in 2007. Undertaking a new climate study, the board concluded that more needed to be done, and done quickly, to prepare for and confront the “catalyst for conflict” that the board now saw in climate change. Guest Editors’ Note: The following commentary derives from a presentation by Vice Admiral Lee Gunn, U.S. Navy (Ret., delivered by invitation at the American Association for the Advancement of Science Meeting, San Jose, California, February 13, 2015. Prior to his advisory role for the U.S. Military and

  20. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  1. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  2. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  3. 24 CFR 232.525 - Note and security form.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...

  4. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  5. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  6. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  7. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  8. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  10. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  11. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  12. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. Biometric Security for Cell Phones

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.

  14. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  15. Transformation in the Developing World: An Analysis of Colombia's Security Transformation

    National Research Council Canada - National Science Library

    Sprunk, Darren

    2004-01-01

    This thesis examines security force transformation issues germane to developing countries, in their attempt to counter emerging threats of international terrorism, insurgency, WMD proliferation and organized crime...

  16. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  17. A security/safety survey of long term care facilities.

    Science.gov (United States)

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  18. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  19. 28 CFR 17.11 - Authority of the Assistant Attorney General for Administration.

    Science.gov (United States)

    2010-07-01

    ... Assistant Attorney General for Administration. (a) The Assistant Attorney General for Administration is... Assistant Attorney General for Administration shall appoint a Department Security Officer and may delegate... necessary to effectively implement this part. (b) The Assistant Attorney General for Administration shall...

  20. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important